WorldWideScience

Sample records for message passing systems

  1. Fault-tolerant Agreement in Synchronous Message-passing Systems

    Raynal, Michel

    2010-01-01

    The present book focuses on the way to cope with the uncertainty created by process failures (crash, omission failures and Byzantine behavior) in synchronous message-passing systems (i.e., systems whose progress is governed by the passage of time). To that end, the book considers fundamental problems that distributed synchronous processes have to solve. These fundamental problems concern agreement among processes (if processes are unable to agree in one way or another in presence of failures, no non-trivial problem can be solved). They are consensus, interactive consistency, k-set agreement an

  2. Message-Passing Receivers for Single Carrier Systems with Frequency-Domain Equalization

    Zhang, Chuanzong; Manchón, Carles Navarro; Wang, Zhongyong

    2015-01-01

    In this letter, we design iterative receiver algorithms for joint frequency-domain equalization and decoding in a single carrier system assuming perfect channel state information. Based on an approximate inference framework that combines belief propagation (BP) and the mean field (MF) approximation......, we propose two receiver algorithms with, respectively, parallel and sequential message-passing schedules in the MF part. A recently proposed receiver based on generalized approximate message passing (GAMP) is used as a benchmarking reference. The simulation results show that the BP-MF receiver...

  3. Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems. Ph.D. Thesis

    Wang, Yi-Min

    1993-01-01

    Checkpointing and rollback recovery are techniques that can provide efficient recovery from transient process failures. In a message-passing system, the rollback of a message sender may cause the rollback of the corresponding receiver, and the system needs to roll back to a consistent set of checkpoints called recovery line. If the processes are allowed to take uncoordinated checkpoints, the above rollback propagation may result in the domino effect which prevents recovery line progression. Traditionally, only obsolete checkpoints before the global recovery line can be discarded, and the necessary and sufficient condition for identifying all garbage checkpoints has remained an open problem. A necessary and sufficient condition for achieving optimal garbage collection is derived and it is proved that the number of useful checkpoints is bounded by N(N+1)/2, where N is the number of processes. The approach is based on the maximum-sized antichain model of consistent global checkpoints and the technique of recovery line transformation and decomposition. It is also shown that, for systems requiring message logging to record in-transit messages, the same approach can be used to achieve optimal message log reclamation. As a final topic, a unifying framework is described by considering checkpoint coordination and exploiting piecewise determinism as mechanisms for bounding rollback propagation, and the applicability of the optimal garbage collection algorithm to domino-free recovery protocols is demonstrated.

  4. Message passing for quantified Boolean formulas

    Zhang, Pan; Ramezanpour, Abolfazl; Zecchina, Riccardo; Zdeborová, Lenka

    2012-01-01

    We introduce two types of message passing algorithms for quantified Boolean formulas (QBF). The first type is a message passing based heuristics that can prove unsatisfiability of the QBF by assigning the universal variables in such a way that the remaining formula is unsatisfiable. In the second type, we use message passing to guide branching heuristics of a Davis–Putnam–Logemann–Loveland (DPLL) complete solver. Numerical experiments show that on random QBFs our branching heuristics give robust exponential efficiency gain with respect to state-of-the-art solvers. We also manage to solve some previously unsolved benchmarks from the QBFLIB library. Apart from this, our study sheds light on using message passing in small systems and as subroutines in complete solvers

  5. A Message-Passing Hardware/Software Cosimulation Environment for Reconfigurable Computing Systems

    Manuel Saldaña

    2009-01-01

    Full Text Available High-performance reconfigurable computers (HPRCs provide a mix of standard processors and FPGAs to collectively accelerate applications. This introduces new design challenges, such as the need for portable programming models across HPRCs and system-level verification tools. To address the need for cosimulating a complete heterogeneous application using both software and hardware in an HPRC, we have created a tool called the Message-passing Simulation Framework (MSF. We have used it to simulate and develop an interface enabling an MPI-based approach to exchange data between X86 processors and hardware engines inside FPGAs. The MSF can also be used as an application development tool that enables multiple FPGAs in simulation to exchange messages amongst themselves and with X86 processors. As an example, we simulate a LINPACK benchmark hardware core using an Intel-FSB-Xilinx-FPGA platform to quickly prototype the hardware, to test the communications. and to verify the benchmark results.

  6. Message Passing Framework for Globally Interconnected Clusters

    Hafeez, M; Riaz, N; Asghar, S; Malik, U A; Rehman, A

    2011-01-01

    In prevailing technology trends it is apparent that the network requirements and technologies will advance in future. Therefore the need of High Performance Computing (HPC) based implementation for interconnecting clusters is comprehensible for scalability of clusters. Grid computing provides global infrastructure of interconnecting clusters consisting of dispersed computing resources over Internet. On the other hand the leading model for HPC programming is Message Passing Interface (MPI). As compared to Grid computing, MPI is better suited for solving most of the complex computational problems. MPI itself is restricted to a single cluster. It does not support message passing over the internet to use the computing resources of different clusters in an optimal way. We propose a model that provides message passing capabilities between parallel applications over the internet. The proposed model is based on Architecture for Java Universal Message Passing (A-JUMP) framework and Enterprise Service Bus (ESB) named as High Performance Computing Bus. The HPC Bus is built using ActiveMQ. HPC Bus is responsible for communication and message passing in an asynchronous manner. Asynchronous mode of communication offers an assurance for message delivery as well as a fault tolerance mechanism for message passing. The idea presented in this paper effectively utilizes wide-area intercluster networks. It also provides scheduling, dynamic resource discovery and allocation, and sub-clustering of resources for different jobs. Performance analysis and comparison study of the proposed framework with P2P-MPI are also presented in this paper.

  7. Message passing with parallel queue traversal

    Underwood, Keith D [Albuquerque, NM; Brightwell, Ronald B [Albuquerque, NM; Hemmert, K Scott [Albuquerque, NM

    2012-05-01

    In message passing implementations, associative matching structures are used to permit list entries to be searched in parallel fashion, thereby avoiding the delay of linear list traversal. List management capabilities are provided to support list entry turnover semantics and priority ordering semantics.

  8. Future-based Static Analysis of Message Passing Programs

    Wytse Oortwijn

    2016-06-01

    Full Text Available Message passing is widely used in industry to develop programs consisting of several distributed communicating components. Developing functionally correct message passing software is very challenging due to the concurrent nature of message exchanges. Nonetheless, many safety-critical applications rely on the message passing paradigm, including air traffic control systems and emergency services, which makes proving their correctness crucial. We focus on the modular verification of MPI programs by statically verifying concrete Java code. We use separation logic to reason about local correctness and define abstractions of the communication protocol in the process algebra used by mCRL2. We call these abstractions futures as they predict how components will interact during program execution. We establish a provable link between futures and program code and analyse the abstract futures via model checking to prove global correctness. Finally, we verify a leader election protocol to demonstrate our approach.

  9. Blind sensor calibration using approximate message passing

    Schülke, Christophe; Caltagirone, Francesco; Zdeborová, Lenka

    2015-01-01

    The ubiquity of approximately sparse data has led a variety of communities to take great interest in compressed sensing algorithms. Although these are very successful and well understood for linear measurements with additive noise, applying them to real data can be problematic if imperfect sensing devices introduce deviations from this ideal signal acquisition process, caused by sensor decalibration or failure. We propose a message passing algorithm called calibration approximate message passing (Cal-AMP) that can treat a variety of such sensor-induced imperfections. In addition to deriving the general form of the algorithm, we numerically investigate two particular settings. In the first, a fraction of the sensors is faulty, giving readings unrelated to the signal. In the second, sensors are decalibrated and each one introduces a different multiplicative gain to the measurements. Cal-AMP shares the scalability of approximate message passing, allowing us to treat large sized instances of these problems, and experimentally exhibits a phase transition between domains of success and failure. (paper)

  10. Message-Passing Receiver for OFDM Systems over Highly Delay-Dispersive Channels

    Barbu, Oana-Elena; Manchón, Carles Navarro; Rom, Christian

    2017-01-01

    Propagation channels with maximum excess delay exceeding the duration of the cyclic prefix (CP) in OFDM systems cause intercarrier and intersymbol interference which, unless accounted for, degrade the receiver performance. Using tools from Bayesian inference and sparse signal reconstruction, we...... derive an iterative algorithm that estimates an approximate representation of the channel impulse response and the noise variance, estimates and cancels the intrinsic interference and decodes the data over a block of symbols. Simulation results show that the receiver employing our algorithm outperforms...

  11. Statistics of Epidemics in Networks by Passing Messages

    Shrestha, Munik Kumar

    Epidemic processes are common out-of-equilibrium phenomena of broad interdisciplinary interest. In this thesis, we show how message-passing approach can be a helpful tool for simulating epidemic models in disordered medium like networks, and in particular for estimating the probability that a given node will become infectious at a particular time. The sort of dynamics we consider are stochastic, where randomness can arise from the stochastic events or from the randomness of network structures. As in belief propagation, variables or messages in message-passing approach are defined on the directed edges of a network. However, unlike belief propagation, where the posterior distributions are updated according to Bayes' rule, in message-passing approach we write differential equations for the messages over time. It takes correlations between neighboring nodes into account while preventing causal signals from backtracking to their immediate source, and thus avoids "echo chamber effects" where a pair of adjacent nodes each amplify the probability that the other is infectious. In our first results, we develop a message-passing approach to threshold models of behavior popular in sociology. These are models, first proposed by Granovetter, where individuals have to hear about a trend or behavior from some number of neighbors before adopting it themselves. In thermodynamic limit of large random networks, we provide an exact analytic scheme while calculating the time dependence of the probabilities and thus learning about the whole dynamics of bootstrap percolation, which is a simple model known in statistical physics for exhibiting discontinuous phase transition. As an application, we apply a similar model to financial networks, studying when bankruptcies spread due to the sudden devaluation of shared assets in overlapping portfolios. We predict that although diversification may be good for individual institutions, it can create dangerous systemic effects, and as a result

  12. S-AMP: Approximate Message Passing for General Matrix Ensembles

    Cakmak, Burak; Winther, Ole; Fleury, Bernard H.

    2014-01-01

    the approximate message-passing (AMP) algorithm to general matrix ensembles with a well-defined large system size limit. The generalization is based on the S-transform (in free probability) of the spectrum of the measurement matrix. Furthermore, we show that the optimality of S-AMP follows directly from its......We propose a novel iterative estimation algorithm for linear observation models called S-AMP. The fixed points of S-AMP are the stationary points of the exact Gibbs free energy under a set of (first- and second-) moment consistency constraints in the large system limit. S-AMP extends...

  13. The serial message-passing schedule for LDPC decoding algorithms

    Liu, Mingshan; Liu, Shanshan; Zhou, Yuan; Jiang, Xue

    2015-12-01

    The conventional message-passing schedule for LDPC decoding algorithms is the so-called flooding schedule. It has the disadvantage that the updated messages cannot be used until next iteration, thus reducing the convergence speed . In this case, the Layered Decoding algorithm (LBP) based on serial message-passing schedule is proposed. In this paper the decoding principle of LBP algorithm is briefly introduced, and then proposed its two improved algorithms, the grouped serial decoding algorithm (Grouped LBP) and the semi-serial decoding algorithm .They can improve LBP algorithm's decoding speed while maintaining a good decoding performance.

  14. High performance message passing for the ATLAS DAQ/EF-1 project

    Mornacchi, Giuseppe

    1999-01-01

    Summary form only. A message passing library has been developed in the context of the ATLAS DAQ/EF-1 project. It is used for time critical applications within the front-end part of the DAQ system, mainly to exchange data control messages between I/O processors. Key objectives of the design were low message overheads, efficient use of the data transfer buses, provision of broadcast functionality and a hardware and operating system independent implementation of the application interface. The design and implementation of the message passing library are presented. As required by the project, the implementation is based on commercial components, namely VMEbus, PCI, the Lynx-OS real-time operating system and an additional inter- processor link, PVIC. The latter offers broadcast functionality identified as being important to the overall performance of the message passing. In addition, performance benchmarks for all implementing buses are presented for both simple test programs and the full DAQ applications. (0 refs)...

  15. EXIT Chart Analysis of Binary Message-Passing Decoders

    Lechner, Gottfried; Pedersen, Troels; Kramer, Gerhard

    2007-01-01

    Binary message-passing decoders for LDPC codes are analyzed using EXIT charts. For the analysis, the variable node decoder performs all computations in the L-value domain. For the special case of a hard decision channel, this leads to the well know Gallager B algorithm, while the analysis can...... be extended to channels with larger output alphabets. By increasing the output alphabet from hard decisions to four symbols, a gain of more than 1.0 dB is achieved using optimized codes. For this code optimization, the mixing property of EXIT functions has to be modified to the case of binary message......-passing decoders....

  16. Protocol-Based Verification of Message-Passing Parallel Programs

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco

    2015-01-01

    We present ParTypes, a type-based methodology for the verification of Message Passing Interface (MPI) programs written in the C programming language. The aim is to statically verify programs against protocol specifications, enforcing properties such as fidelity and absence of deadlocks. We develo...

  17. Track-stitching using graphical models and message passing

    Van der Merwe, LJ

    2013-07-01

    Full Text Available In order to stitch tracks together, two tasks are required, namely tracking and track stitching. In this study track stitching is performed using a graphical model and message passing (belief propagation) approach. Tracks are modelled as nodes in a...

  18. A message passing algorithm for the evaluation of social influence

    Vassio, Luca; Fagnani, Fabio; Frasca, Paolo; Ozdaglar, Asuman

    2014-01-01

    In this paper, we define a new measure of node centrality in social networks, the Harmonic Influence Centrality, which emerges naturally in the study of social influence over networks. Next, we introduce a distributed message passing algorithm to compute the Harmonic Influence Centrality of each

  19. Belief propagation decoding of quantum channels by passing quantum messages

    Renes, Joseph M

    2017-01-01

    The belief propagation (BP) algorithm is a powerful tool in a wide range of disciplines from statistical physics to machine learning to computational biology, and is ubiquitous in decoding classical error-correcting codes. The algorithm works by passing messages between nodes of the factor graph associated with the code and enables efficient decoding of the channel, in some cases even up to the Shannon capacity. Here we construct the first BP algorithm which passes quantum messages on the factor graph and is capable of decoding the classical–quantum channel with pure state outputs. This gives explicit decoding circuits whose number of gates is quadratic in the code length. We also show that this decoder can be modified to work with polar codes for the pure state channel and as part of a decoder for transmitting quantum information over the amplitude damping channel. These represent the first explicit capacity-achieving decoders for non-Pauli channels. (fast track communication)

  20. Belief propagation decoding of quantum channels by passing quantum messages

    Renes, Joseph M.

    2017-07-01

    The belief propagation (BP) algorithm is a powerful tool in a wide range of disciplines from statistical physics to machine learning to computational biology, and is ubiquitous in decoding classical error-correcting codes. The algorithm works by passing messages between nodes of the factor graph associated with the code and enables efficient decoding of the channel, in some cases even up to the Shannon capacity. Here we construct the first BP algorithm which passes quantum messages on the factor graph and is capable of decoding the classical-quantum channel with pure state outputs. This gives explicit decoding circuits whose number of gates is quadratic in the code length. We also show that this decoder can be modified to work with polar codes for the pure state channel and as part of a decoder for transmitting quantum information over the amplitude damping channel. These represent the first explicit capacity-achieving decoders for non-Pauli channels.

  1. Analysis and Design of Binary Message-Passing Decoders

    Lechner, Gottfried; Pedersen, Troels; Kramer, Gerhard

    2012-01-01

    Binary message-passing decoders for low-density parity-check (LDPC) codes are studied by using extrinsic information transfer (EXIT) charts. The channel delivers hard or soft decisions and the variable node decoder performs all computations in the L-value domain. A hard decision channel results...... message-passing decoders. Finally, it is shown that errors on cycles consisting only of degree two and three variable nodes cannot be corrected and a necessary and sufficient condition for the existence of a cycle-free subgraph is derived....... in the well-know Gallager B algorithm, and increasing the output alphabet from hard decisions to two bits yields a gain of more than 1.0 dB in the required signal to noise ratio when using optimized codes. The code optimization requires adapting the mixing property of EXIT functions to the case of binary...

  2. Parallelization of a hydrological model using the message passing interface

    Wu, Yiping; Li, Tiejian; Sun, Liqun; Chen, Ji

    2013-01-01

    With the increasing knowledge about the natural processes, hydrological models such as the Soil and Water Assessment Tool (SWAT) are becoming larger and more complex with increasing computation time. Additionally, other procedures such as model calibration, which may require thousands of model iterations, can increase running time and thus further reduce rapid modeling and analysis. Using the widely-applied SWAT as an example, this study demonstrates how to parallelize a serial hydrological model in a Windows® environment using a parallel programing technology—Message Passing Interface (MPI). With a case study, we derived the optimal values for the two parameters (the number of processes and the corresponding percentage of work to be distributed to the master process) of the parallel SWAT (P-SWAT) on an ordinary personal computer and a work station. Our study indicates that model execution time can be reduced by 42%–70% (or a speedup of 1.74–3.36) using multiple processes (two to five) with a proper task-distribution scheme (between the master and slave processes). Although the computation time cost becomes lower with an increasing number of processes (from two to five), this enhancement becomes less due to the accompanied increase in demand for message passing procedures between the master and all slave processes. Our case study demonstrates that the P-SWAT with a five-process run may reach the maximum speedup, and the performance can be quite stable (fairly independent of a project size). Overall, the P-SWAT can help reduce the computation time substantially for an individual model run, manual and automatic calibration procedures, and optimization of best management practices. In particular, the parallelization method we used and the scheme for deriving the optimal parameters in this study can be valuable and easily applied to other hydrological or environmental models.

  3. Weighted community detection and data clustering using message passing

    Shi, Cheng; Liu, Yanchen; Zhang, Pan

    2018-03-01

    Grouping objects into clusters based on the similarities or weights between them is one of the most important problems in science and engineering. In this work, by extending message-passing algorithms and spectral algorithms proposed for an unweighted community detection problem, we develop a non-parametric method based on statistical physics, by mapping the problem to the Potts model at the critical temperature of spin-glass transition and applying belief propagation to solve the marginals corresponding to the Boltzmann distribution. Our algorithm is robust to over-fitting and gives a principled way to determine whether there are significant clusters in the data and how many clusters there are. We apply our method to different clustering tasks. In the community detection problem in weighted and directed networks, we show that our algorithm significantly outperforms existing algorithms. In the clustering problem, where the data were generated by mixture models in the sparse regime, we show that our method works all the way down to the theoretical limit of detectability and gives accuracy very close to that of the optimal Bayesian inference. In the semi-supervised clustering problem, our method only needs several labels to work perfectly in classic datasets. Finally, we further develop Thouless-Anderson-Palmer equations which heavily reduce the computation complexity in dense networks but give almost the same performance as belief propagation.

  4. Stampi: a message passing library for distributed parallel computing. User's guide

    Imamura, Toshiyuki; Koide, Hiroshi; Takemiya, Hiroshi

    1998-11-01

    A new message passing library, Stampi, has been developed to realize a computation with different kind of parallel computers arbitrarily and making MPI (Message Passing Interface) as an unique interface for communication. Stampi is based on MPI2 specification. It realizes dynamic process creation to different machines and communication between spawned one within the scope of MPI semantics. Vender implemented MPI as a closed system in one parallel machine and did not support both functions; process creation and communication to external machines. Stampi supports both functions and enables us distributed parallel computing. Currently Stampi has been implemented on COMPACS (COMplex PArallel Computer System) introduced in CCSE, five parallel computers and one graphic workstation, and any communication on them can be processed on. (author)

  5. Stampi: a message passing library for distributed parallel computing. User's guide, second edition

    Imamura, Toshiyuki; Koide, Hiroshi; Takemiya, Hiroshi

    2000-02-01

    A new message passing library, Stampi, has been developed to realize a computation with different kind of parallel computers arbitrarily and making MPI (Message Passing Interface) as an unique interface for communication. Stampi is based on the MPI2 specification, and it realizes dynamic process creation to different machines and communication between spawned one within the scope of MPI semantics. Main features of Stampi are summarized as follows: (i) an automatic switch function between external- and internal communications, (ii) a message routing/relaying with a routing module, (iii) a dynamic process creation, (iv) a support of two types of connection, Master/Slave and Client/Server, (v) a support of a communication with Java applets. Indeed vendors implemented MPI libraries as a closed system in one parallel machine or their systems, and did not support both functions; process creation and communication to external machines. Stampi supports both functions and enables us distributed parallel computing. Currently Stampi has been implemented on COMPACS (COMplex PArallel Computer System) introduced in CCSE, five parallel computers and one graphic workstation, moreover on eight kinds of parallel machines, totally fourteen systems. Stampi provides us MPI communication functionality on them. This report describes mainly the usage of Stampi. (author)

  6. The specification of Stampi, a message passing library for distributed parallel computing

    Imamura, Toshiyuki; Takemiya, Hiroshi; Koide, Hiroshi

    2000-03-01

    At CCSE, Center for Promotion of Computational Science and Engineering, a new message passing library for heterogeneous and distributed parallel computing has been developed, and it is called as Stampi. Stampi enables us to communicate between any combination of parallel computers as well as workstations. Currently, a Stampi system is constructed from Stampi library and Stampi/Java. It provides functions to connect a Stampi application with not only those on COMPACS, COMplex Parallel Computer System, but also applets which work on WWW browsers. This report summarizes the specifications of Stampi and details the development of its system. (author)

  7. Why pass on viral messages? Because they connect emotionally

    Dobele, A.; Lindgreen, A.; Beverland, M.; Vanhamme, J.; Wijk, van R.

    2007-01-01

    In this article, we identify that successful viral marketing campaigns trigger an emotional response in recipients. Working under this premise, we examine the effects of viral messages containing the six primary emotions (surprise, joy, sadness, anger, fear, and disgust) on recipients' emotional

  8. Theoretic derivation of directed acyclic subgraph algorithm and comparisons with message passing algorithm

    Ha, Jeongmok; Jeong, Hong

    2016-07-01

    This study investigates the directed acyclic subgraph (DAS) algorithm, which is used to solve discrete labeling problems much more rapidly than other Markov-random-field-based inference methods but at a competitive accuracy. However, the mechanism by which the DAS algorithm simultaneously achieves competitive accuracy and fast execution speed, has not been elucidated by a theoretical derivation. We analyze the DAS algorithm by comparing it with a message passing algorithm. Graphical models, inference methods, and energy-minimization frameworks are compared between DAS and message passing algorithms. Moreover, the performances of DAS and other message passing methods [sum-product belief propagation (BP), max-product BP, and tree-reweighted message passing] are experimentally compared.

  9. A real-time MPEG software decoder using a portable message-passing library

    Kwong, Man Kam; Tang, P.T. Peter; Lin, Biquan

    1995-12-31

    We present a real-time MPEG software decoder that uses message-passing libraries such as MPL, p4 and MPI. The parallel MPEG decoder currently runs on the IBM SP system but can be easil ported to other parallel machines. This paper discusses our parallel MPEG decoding algorithm as well as the parallel programming environment under which it uses. Several technical issues are discussed, including balancing of decoding speed, memory limitation, 1/0 capacities, and optimization of MPEG decoding components. This project shows that a real-time portable software MPEG decoder is feasible in a general-purpose parallel machine.

  10. Partition function expansion on region graphs and message-passing equations

    Zhou, Haijun; Wang, Chuang; Xiao, Jing-Qing; Bi, Zedong

    2011-01-01

    Disordered and frustrated graphical systems are ubiquitous in physics, biology, and information science. For models on complete graphs or random graphs, deep understanding has been achieved through the mean-field replica and cavity methods. But finite-dimensional 'real' systems remain very challenging because of the abundance of short loops and strong local correlations. A statistical mechanics theory is constructed in this paper for finite-dimensional models based on the mathematical framework of the partition function expansion and the concept of region graphs. Rigorous expressions for the free energy and grand free energy are derived. Message-passing equations on the region graph, such as belief propagation and survey propagation, are also derived rigorously. (letter)

  11. An efficient communication scheme for solving Sn equations on message-passing multiprocessors

    Azmy, Y.Y.

    1993-01-01

    Early models of Intel's hypercube multiprocessors, e.g., the iPSC/1 and iPSC/2, were characterized by the high latency of message passing. This relatively weak dependence of the communication penalty on the size of messages, in contrast to its strong dependence on the number of messages, justified using the Fan-in Fan-out algorithm (which implements a minimum spanning tree path) to perform global operations, such as global sums, etc. Recent models of message-passing computers, such as the iPSC/860 and the Paragon, have been found to possess much smaller latency, thus forcing a reexamination of the issue of performance optimization with respect to communication schemes. Essentially, the Fan-in Fan-out scheme minimizes the number of nonsimultaneous messages sent but not the volume of data traffic across the network. Furthermore, if a global operation is performed in conjunction with the message passing, a large fraction of the attached nodes remains idle as the number of utilized processors is halved in each step of the process. On the other hand, the Recursive Halving scheme offers the smallest communication cost for global operations but has some drawbacks

  12. McMPI – a managed-code message passing interface library for high performance communication in C#

    Holmes, Daniel John

    2012-01-01

    This work endeavours to achieve technology transfer between established best-practice in academic high-performance computing and current techniques in commercial high-productivity computing. It shows that a credible high-performance message-passing communication library, with semantics and syntax following the Message-Passing Interface (MPI) Standard, can be built in pure C# (one of the .Net suite of computer languages). Message-passing has been the dominant paradigm in high-pe...

  13. Optimizing spread dynamics on graphs by message passing

    Altarelli, F; Braunstein, A; Dall’Asta, L; Zecchina, R

    2013-01-01

    Cascade processes are responsible for many important phenomena in natural and social sciences. Simple models of irreversible dynamics on graphs, in which nodes activate depending on the state of their neighbors, have been successfully applied to describe cascades in a large variety of contexts. Over the past decades, much effort has been devoted to understanding the typical behavior of the cascades arising from initial conditions extracted at random from some given ensemble. However, the problem of optimizing the trajectory of the system, i.e. of identifying appropriate initial conditions to maximize (or minimize) the final number of active nodes, is still considered to be practically intractable, with the only exception being models that satisfy a sort of diminishing returns property called submodularity. Submodular models can be approximately solved by means of greedy strategies, but by definition they lack cooperative characteristics which are fundamental in many real systems. Here we introduce an efficient algorithm based on statistical physics for the optimization of trajectories in cascade processes on graphs. We show that for a wide class of irreversible dynamics, even in the absence of submodularity, the spread optimization problem can be solved efficiently on large networks. Analytic and algorithmic results on random graphs are complemented by the solution of the spread maximization problem on a real-world network (the Epinions consumer reviews network). (paper)

  14. Optimizing spread dynamics on graphs by message passing

    Altarelli, F.; Braunstein, A.; Dall'Asta, L.; Zecchina, R.

    2013-09-01

    Cascade processes are responsible for many important phenomena in natural and social sciences. Simple models of irreversible dynamics on graphs, in which nodes activate depending on the state of their neighbors, have been successfully applied to describe cascades in a large variety of contexts. Over the past decades, much effort has been devoted to understanding the typical behavior of the cascades arising from initial conditions extracted at random from some given ensemble. However, the problem of optimizing the trajectory of the system, i.e. of identifying appropriate initial conditions to maximize (or minimize) the final number of active nodes, is still considered to be practically intractable, with the only exception being models that satisfy a sort of diminishing returns property called submodularity. Submodular models can be approximately solved by means of greedy strategies, but by definition they lack cooperative characteristics which are fundamental in many real systems. Here we introduce an efficient algorithm based on statistical physics for the optimization of trajectories in cascade processes on graphs. We show that for a wide class of irreversible dynamics, even in the absence of submodularity, the spread optimization problem can be solved efficiently on large networks. Analytic and algorithmic results on random graphs are complemented by the solution of the spread maximization problem on a real-world network (the Epinions consumer reviews network).

  15. Neighbourhood-consensus message passing and its potentials in image processing applications

    Ružic, Tijana; Pižurica, Aleksandra; Philips, Wilfried

    2011-03-01

    In this paper, a novel algorithm for inference in Markov Random Fields (MRFs) is presented. Its goal is to find approximate maximum a posteriori estimates in a simple manner by combining neighbourhood influence of iterated conditional modes (ICM) and message passing of loopy belief propagation (LBP). We call the proposed method neighbourhood-consensus message passing because a single joint message is sent from the specified neighbourhood to the central node. The message, as a function of beliefs, represents the agreement of all nodes within the neighbourhood regarding the labels of the central node. This way we are able to overcome the disadvantages of reference algorithms, ICM and LBP. On one hand, more information is propagated in comparison with ICM, while on the other hand, the huge amount of pairwise interactions is avoided in comparison with LBP by working with neighbourhoods. The idea is related to the previously developed iterated conditional expectations algorithm. Here we revisit it and redefine it in a message passing framework in a more general form. The results on three different benchmarks demonstrate that the proposed technique can perform well both for binary and multi-label MRFs without any limitations on the model definition. Furthermore, it manifests improved performance over related techniques either in terms of quality and/or speed.

  16. Algorithms for parallel flow solvers on message passing architectures

    Vanderwijngaart, Rob F.

    1995-01-01

    The purpose of this project has been to identify and test suitable technologies for implementation of fluid flow solvers -- possibly coupled with structures and heat equation solvers -- on MIMD parallel computers. In the course of this investigation much attention has been paid to efficient domain decomposition strategies for ADI-type algorithms. Multi-partitioning derives its efficiency from the assignment of several blocks of grid points to each processor in the parallel computer. A coarse-grain parallelism is obtained, and a near-perfect load balance results. In uni-partitioning every processor receives responsibility for exactly one block of grid points instead of several. This necessitates fine-grain pipelined program execution in order to obtain a reasonable load balance. Although fine-grain parallelism is less desirable on many systems, especially high-latency networks of workstations, uni-partition methods are still in wide use in production codes for flow problems. Consequently, it remains important to achieve good efficiency with this technique that has essentially been superseded by multi-partitioning for parallel ADI-type algorithms. Another reason for the concentration on improving the performance of pipeline methods is their applicability in other types of flow solver kernels with stronger implied data dependence. Analytical expressions can be derived for the size of the dynamic load imbalance incurred in traditional pipelines. From these it can be determined what is the optimal first-processor retardation that leads to the shortest total completion time for the pipeline process. Theoretical predictions of pipeline performance with and without optimization match experimental observations on the iPSC/860 very well. Analysis of pipeline performance also highlights the effect of uncareful grid partitioning in flow solvers that employ pipeline algorithms. If grid blocks at boundaries are not at least as large in the wall-normal direction as those

  17. Approximate message passing for nonconvex sparse regularization with stability and asymptotic analysis

    Sakata, Ayaka; Xu, Yingying

    2018-03-01

    We analyse a linear regression problem with nonconvex regularization called smoothly clipped absolute deviation (SCAD) under an overcomplete Gaussian basis for Gaussian random data. We propose an approximate message passing (AMP) algorithm considering nonconvex regularization, namely SCAD-AMP, and analytically show that the stability condition corresponds to the de Almeida-Thouless condition in spin glass literature. Through asymptotic analysis, we show the correspondence between the density evolution of SCAD-AMP and the replica symmetric (RS) solution. Numerical experiments confirm that for a sufficiently large system size, SCAD-AMP achieves the optimal performance predicted by the replica method. Through replica analysis, a phase transition between replica symmetric and replica symmetry breaking (RSB) region is found in the parameter space of SCAD. The appearance of the RS region for a nonconvex penalty is a significant advantage that indicates the region of smooth landscape of the optimization problem. Furthermore, we analytically show that the statistical representation performance of the SCAD penalty is better than that of \

  18. Using Partial Reconfiguration and Message Passing to Enable FPGA-Based Generic Computing Platforms

    Manuel Saldaña

    2012-01-01

    Full Text Available Partial reconfiguration (PR is an FPGA feature that allows the modification of certain parts of an FPGA while the rest of the system continues to operate without disruption. This distinctive characteristic of FPGAs has many potential benefits but also challenges. The lack of good CAD tools and the deep hardware knowledge requirement result in a hard-to-use feature. In this paper, the new partition-based Xilinx PR flow is used to incorporate PR within our MPI-based message-passing framework to allow hardware designers to create template bitstreams, which are predesigned, prerouted, generic bitstreams that can be reused for multiple applications. As an example of the generality of this approach, four different applications that use the same template bitstream are run consecutively, with a PR operation performed at the beginning of each application to instantiate the desired application engine. We demonstrate a simplified, reusable, high-level, and portable PR interface for X86-FPGA hybrid machines. PR issues such as local resets of reconfigurable modules and context saving and restoring are addressed in this paper followed by some examples and preliminary PR overhead measurements.

  19. Message passing vs. shared address space on a cluster of SMPs

    Shan, Hongzhang; Singh, Jaswinder Pal; Oliker, Leonid; Biswas, Rupak

    2001-01-01

    The emergence of scalable computer architectures using clusters of PCs or PC-SMPs with commodity networking has made them attractive platforms for high-end scientific computing. Currently, message passing (MP) and shared address space (SAS) are the two leading programming paradigms for these systems. MP has been standardized with MPI, and is the most common and mature parallel programming approach. However, MP code development can be extremely difficult, especially for irregularly structured computations. SAS offers substantial ease of programming, but may suffer from performance limitations due to poor spatial locality and high protocol overhead. In this paper, they compare the performance of and programming effort required for six applications under both programming models on a 32-CPU PC-SMP cluster. Our application suite consists of codes that typically do not exhibit scalable performance under shared-memory programming due to their high communication-to-computation ratios and complex communication patterns. Results indicate that SAS can achieve about half the parallel efficiency of MPI for most of the applications; however, on certain classes of problems, SAS performance is competitive with MPI

  20. A Modular Instant Messaging System

    Mohamad Raad; Zouhair Bazzal; Majd Ghareeb; Hanan Farhat; Semar Bahmad

    2017-01-01

    Instant Messaging (IM) Android applications are a trend nowadays. These applications are categorized according to their features: usability, flexibility, privacy and security. However, IM applications tend to be inflexible in terms of functionality offered. The “Dble-U” system was developed as a solution to this inflexibility, with a focus on privacy as an example use case. “Dble-U” is a configurable modular system consisting of an Android chatting application, a privacy controller applicatio...

  1. A message-passing approach to random constraint satisfaction problems with growing domains

    Zhao, Chunyan; Zheng, Zhiming; Zhou, Haijun; Xu, Ke

    2011-01-01

    Message-passing algorithms based on belief propagation (BP) are implemented on a random constraint satisfaction problem (CSP) referred to as model RB, which is a prototype of hard random CSPs with growing domain size. In model RB, the number of candidate discrete values (the domain size) of each variable increases polynomially with the variable number N of the problem formula. Although the satisfiability threshold of model RB is exactly known, finding solutions for a single problem formula is quite challenging and attempts have been limited to cases of N ∼ 10 2 . In this paper, we propose two different kinds of message-passing algorithms guided by BP for this problem. Numerical simulations demonstrate that these algorithms allow us to find a solution for random formulas of model RB with constraint tightness slightly less than p cr , the threshold value for the satisfiability phase transition. To evaluate the performance of these algorithms, we also provide a local search algorithm (random walk) as a comparison. Besides this, the simulated time dependence of the problem size N and the entropy of the variables for growing domain size are discussed

  2. MessageSpace: a messaging system for health research

    Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura

    2013-03-01

    Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.

  3. Distributed parallel messaging for multiprocessor systems

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  4. The design of multi-core DSP parallel model based on message passing and multi-level pipeline

    Niu, Jingyu; Hu, Jian; He, Wenjing; Meng, Fanrong; Li, Chuanrong

    2017-10-01

    Currently, the design of embedded signal processing system is often based on a specific application, but this idea is not conducive to the rapid development of signal processing technology. In this paper, a parallel processing model architecture based on multi-core DSP platform is designed, and it is mainly suitable for the complex algorithms which are composed of different modules. This model combines the ideas of multi-level pipeline parallelism and message passing, and summarizes the advantages of the mainstream model of multi-core DSP (the Master-Slave model and the Data Flow model), so that it has better performance. This paper uses three-dimensional image generation algorithm to validate the efficiency of the proposed model by comparing with the effectiveness of the Master-Slave and the Data Flow model.

  5. CMLOG: A common message logging system

    Chen, J.; Akers, W.; Bickley, M.; Wu, D.; Watson, W. III

    1997-01-01

    The Common Message Logging (CMLOG) system is an object-oriented and distributed system that not only allows applications and systems to log data (messages) of any type into a centralized database but also lets applications view incoming messages in real-time or retrieve stored data from the database according to selection rules. It consists of a concurrent Unix server that handles incoming logging or searching messages, a Motif browser that can view incoming messages in real-time or display stored data in the database, a client daemon that buffers and sends logging messages to the server, and libraries that can be used by applications to send data to or retrieve data from the database via the server. This paper presents the design and implementation of the CMLOG system meanwhile it will also address the issue of integration of CMLOG into existing control systems. CMLOG into existing control systems

  6. A System for Exchanging Control and Status Messages in the NOvA Data Acquisition

    Biery, K.A.; Cooper, R.G.; Foulkes, S.C.; Guglielmo, G.M.; Piccoli, L.P.; Votava, M.E.V.; Fermilab

    2007-01-01

    In preparation for NOvA, a future neutrino experiment at Fermilab, we are developing a system for passing control and status messages in the data acquisition system. The DAQ system will consist of applications running on approximately 450 nodes. The message passing system will use a publish-subscribe model and will provide support for sending messages and receiving the associated replies. Additional features of the system include a layered architecture with custom APIs tailored to the needs of a DAQ system, the use of an open source messaging system for handling the reliable delivery of messages, the ability to send broadcasts to groups of applications, and APIs in Java, C++, and Python. Our choice for the open source system to deliver messages is EPICS. We will discuss the architecture of the system, our experience with EPICS, and preliminary test results

  7. A System for Exchanging Control and Status Messages in the NOvA Data Acquisition

    Biery, K.A.; Cooper, R.G.; Foulkes, S.C.; Guglielmo, G.M.; Piccoli, L.P.; Votava, M.E.V.; /Fermilab

    2007-04-01

    In preparation for NOvA, a future neutrino experiment at Fermilab, we are developing a system for passing control and status messages in the data acquisition system. The DAQ system will consist of applications running on approximately 450 nodes. The message passing system will use a publish-subscribe model and will provide support for sending messages and receiving the associated replies. Additional features of the system include a layered architecture with custom APIs tailored to the needs of a DAQ system, the use of an open source messaging system for handling the reliable delivery of messages, the ability to send broadcasts to groups of applications, and APIs in Java, C++, and Python. Our choice for the open source system to deliver messages is EPICS. We will discuss the architecture of the system, our experience with EPICS, and preliminary test results.

  8. Distributed primal–dual interior-point methods for solving tree-structured coupled convex problems using message-passing

    Khoshfetrat Pakazad, Sina; Hansson, Anders; Andersen, Martin S.

    2017-01-01

    In this paper, we propose a distributed algorithm for solving coupled problems with chordal sparsity or an inherent tree structure which relies on primal–dual interior-point methods. We achieve this by distributing the computations at each iteration, using message-passing. In comparison to existi...

  9. Parallelization of MCNP Monte Carlo neutron and photon transport code in parallel virtual machine and message passing interface

    Deng Li; Xie Zhongsheng

    1999-01-01

    The coupled neutron and photon transport Monte Carlo code MCNP (version 3B) has been parallelized in parallel virtual machine (PVM) and message passing interface (MPI) by modifying a previous serial code. The new code has been verified by solving sample problems. The speedup increases linearly with the number of processors and the average efficiency is up to 99% for 12-processor. (author)

  10. Design of a Message Passing Model for Use in a Heterogeneous CPU-NFP Framework for Network Analytics

    Pennefather, S

    2017-09-01

    Full Text Available of applications written in the Go programming language to be executed on a Network Flow Processor (NFP) for enhanced performance. This paper explores the need and feasibility of implementing a message passing model for data transmission between the NFP and CPU...

  11. Communication strategies for angular domain decomposition of transport calculations on message passing multiprocessors

    Azmy, Y.Y.

    1997-01-01

    The effect of three communication schemes for solving Arbitrarily High Order Transport (AHOT) methods of the Nodal type on parallel performance is examined via direct measurements and performance models. The target architecture in this study is Oak Ridge National Laboratory's 128 node Paragon XP/S 5 computer and the parallelization is based on the Parallel Virtual Machine (PVM) library. However, the conclusions reached can be easily generalized to a large class of message passing platforms and communication software. The three schemes considered here are: (1) PVM's global operations (broadcast and reduce) which utilizes the Paragon's native corresponding operations based on a spanning tree routing; (2) the Bucket algorithm wherein the angular domain decomposition of the mesh sweep is complemented with a spatial domain decomposition of the accumulation process of the scalar flux from the angular flux and the convergence test; (3) a distributed memory version of the Bucket algorithm that pushes the spatial domain decomposition one step farther by actually distributing the fixed source and flux iterates over the memories of the participating processes. Their conclusion is that the Bucket algorithm is the most efficient of the three if all participating processes have sufficient memories to hold the entire problem arrays. Otherwise, the third scheme becomes necessary at an additional cost to speedup and parallel efficiency that is quantifiable via the parallel performance model

  12. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  13. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    Udaya Suriya Raj Kumar Dhamodharan

    2015-01-01

    Full Text Available Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method with MAP (message authentication and passing for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  14. Scalable High Performance Message Passing over InfiniBand for Open MPI

    Friedley, A; Hoefler, T; Leininger, M L; Lumsdaine, A

    2007-10-24

    InfiniBand (IB) is a popular network technology for modern high-performance computing systems. MPI implementations traditionally support IB using a reliable, connection-oriented (RC) transport. However, per-process resource usage that grows linearly with the number of processes, makes this approach prohibitive for large-scale systems. IB provides an alternative in the form of a connectionless unreliable datagram transport (UD), which allows for near-constant resource usage and initialization overhead as the process count increases. This paper describes a UD-based implementation for IB in Open MPI as a scalable alternative to existing RC-based schemes. We use the software reliability capabilities of Open MPI to provide the guaranteed delivery semantics required by MPI. Results show that UD not only requires fewer resources at scale, but also allows for shorter MPI startup times. A connectionless model also improves performance for applications that tend to send small messages to many different processes.

  15. What it Takes to Get Passed On: Message Content, Style, and Structure as Predictors of Retransmission in the Boston Marathon Bombing Response.

    Jeannette Sutton

    Full Text Available Message retransmission is a central aspect of information diffusion. In a disaster context, the passing on of official warning messages by members of the public also serves as a behavioral indicator of message salience, suggesting that particular messages are (or are not perceived by the public to be both noteworthy and valuable enough to share with others. This study provides the first examination of terse message retransmission of official warning messages in response to a domestic terrorist attack, the Boston Marathon Bombing in 2013. Using messages posted from public officials' Twitter accounts that were active during the period of the Boston Marathon bombing and manhunt, we examine the features of messages that are associated with their retransmission. We focus on message content, style, and structure, as well as the networked relationships of message senders to answer the question: what characteristics of a terse message sent under conditions of imminent threat predict its retransmission among members of the public? We employ a negative binomial model to examine how message characteristics affect message retransmission. We find that, rather than any single effect dominating the process, retransmission of official Tweets during the Boston bombing response was jointly influenced by various message content, style, and sender characteristics. These findings suggest the need for more work that investigates impact of multiple factors on the allocation of attention and on message retransmission during hazard events.

  16. The Message Reporting System of the ATLAS DAQ System

    Caprini, M; Kolos, S; 10th ICATPP Conference on Astroparticle, Particle, Space Physics, Detectors and Medical Physics Applications

    2008-01-01

    The Message Reporting System (MRS) in the ATLAS data acquisition system (DAQ) is one package of the Online Software which acts as a glue of various elements of DAQ, High Level Trigger (HLT) and Detector Control System (DCS). The aim of the MRS is to provide a facility which allows all software components in ATLAS to report messages to other components of the distributed DAQ system. The processes requiring a MRS are on one hand applications that report error conditions or information and on the other hand message processors that receive reported messages. A message reporting application can inject one or more messages into the MRS at any time. An application wishing to receive messages can subscribe to a message group according to defined criteria. The application receives messages that fulfill the subscription criteria when they are reported to MRS. The receiver message processing can consist of anything from simply logging the messages in a file/terminal to performing message analysis. The inter-process comm...

  17. Instant Apache Camel messaging system

    Sharapov, Evgeniy

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A beginner's guide to Apache Camel that walks you through basic operations like installation and setup right through to developing simple applications.This book is a good starting point for Java developers who have to work on an application dealing with various systems and interfaces but who haven't yet started using Enterprise System Buses or Java Business Integration frameworks.

  18. Using Publish-Subscribe Messaging for System Status and Automation

    Smith, Danford S.

    2015-01-01

    The NASA Goddard Mission Services Evolution Center (GMSEC) system is a message-based plug-and-play open system architecture used in many of NASA mission operations centers. This presentation will focus on the use of GMSEC standard messages to report and analyze the status of a system and enable the automation of the system's components. In GMSEC systems, each component reports its status using a keep-alive message and also publishes status and activities as log messages. In addition, the components can accept functional directive messages from the GMSEC message bus. Over the past several years, development teams have found ways to utilize these messages to create innovative display pages and increasingly sophisticated approaches to automation. This presentation will show the flexibility and value of the message-based approach to system awareness and automation.

  19. The prototype message broadcast system for the Superconducting Super Collider

    Low, K.; Skegg, R.

    1990-11-01

    A prototype unified message broadcast system to handle the site-wide distribution of all control system messages for the Superconducting Super Collider is presented. The messages are assembled in the control room area and encapsulated for transmission via a general fiber-optic link system to devices distributed throughout 70 miles of tunnels. An embedded timing signal is used by the distribution system to ensure that messages arrive at all devices simultaneously. Devices receive messages using a special receiver sub-system. A simple version of this system is to be used in the Accelerator Systems String Test (ASST) at the SSC site in 1991. 3 refs., 6 figs., 1 tab

  20. A model based message passing approach for flexible and scalable home automation controllers

    Bienhaus, D. [INNIAS GmbH und Co. KG, Frankenberg (Germany); David, K.; Klein, N.; Kroll, D. [ComTec Kassel Univ., SE Kassel Univ. (Germany); Heerdegen, F.; Jubeh, R.; Zuendorf, A. [Kassel Univ. (Germany). FG Software Engineering; Hofmann, J. [BSC Computer GmbH, Allendorf (Germany)

    2012-07-01

    There is a large variety of home automation systems that are largely proprietary systems from different vendors. In addition, the configuration and administration of home automation systems is frequently a very complex task especially, if more complex functionality shall be achieved. Therefore, an open model for home automation was developed that is especially designed for easy integration of various home automation systems. This solution also provides a simple modeling approach that is inspired by typical home automation components like switches, timers, etc. In addition, a model based technology to achieve rich functionality and usability was implemented. (orig.)

  1. The prototype message broadcast system for the superconducting super collider

    Low, K.; Skegg, R.

    1991-01-01

    This paper presents a prototype unified message broadcast system to handle the site-wide distribution of all control system messages for the Superconducting Super Collider. The messages are assembled in the control room area and encapsulated for transmission via a general fiber-optic link system to devices distributed throughout 70 miles of tunnels. An embedded timing signal is used by the distribution system to ensure that messages arrive at all devices simultaneously. Devices receive messages using a special receiver sub-system

  2. Shared memory and message passing revisited in the many-core era

    CERN. Geneva

    2016-01-01

    In the 70s, Edsgar Dijkstra, Per Brinch Hansen and C.A.R Hoare introduced the fundamental concepts for concurrent computing. It was clear that concrete communication mechanisms were required in order to achieve effective concurrency. Whether you're developing a multithreaded program running on a single node, or a distributed system spanning over hundreds of thousands cores, the choice of the communication mechanism for your system must be done intelligently because of the implicit programmability, performance and scalability trade-offs. With the emergence of many-core computing architectures many assumptions may not be true anymore. In this talk we will try to provide insight on the characteristics of these communication models by providing basic theoretical background and then focus on concrete practical examples based on indicative use case scenarios. The case studies of this presentation cover popular programming models, operating systems and concurrency frameworks in the context of many-core processors.

  3. On the adequacy of message-passing parallel supercomputers for solving neutron transport problems

    Azmy, Y.Y.

    1990-01-01

    A coarse-grained, static-scheduling parallelization of the standard iterative scheme used for solving the discrete-ordinates approximation of the neutron transport equation is described. The parallel algorithm is based on a decomposition of the angular domain along the discrete ordinates, thus naturally producing a set of completely uncoupled systems of equations in each iteration. Implementation of the parallel code on Intcl's iPSC/2 hypercube, and solutions to test problems are presented as evidence of the high speedup and efficiency of the parallel code. The performance of the parallel code on the iPSC/2 is analyzed, and a model for the CPU time as a function of the problem size (order of angular quadrature) and the number of participating processors is developed and validated against measured CPU times. The performance model is used to speculate on the potential of massively parallel computers for significantly speeding up real-life transport calculations at acceptable efficiencies. We conclude that parallel computers with a few hundred processors are capable of producing large speedups at very high efficiencies in very large three-dimensional problems. 10 refs., 8 figs

  4. System of message for gamma-radiation monitor

    Bolic, M.D.; Koturovic, A.M.

    2001-01-01

    Paper describes a system of voice messages for gamma-radiation monitor based on PC. The systems reproduces recorded messages that is simpler than the process of their synthesis. Message choice is based on combination of recorded digital results and/or received reference messages or warnings. The system of generation of voice messages applies the Windows based software. The total memory array required to create independent voice system is maximum 1.7 mbyte. The monitor may be used for continuous monitoring of radioactivity level with 5-8 s period of message repetition. Another option of the system operation is based on monitor application for the environment monitoring. Period of messages in this case is equal to 5-30 min [ru

  5. The Message Logging System for NOνA Experiment

    Lu Qiming; Kowalkowski, J B; Biery, K A

    2011-01-01

    The message logging system provides the infrastructure for all of the distributed processes in the data acquisition (DAQ) to report status messages of various severities in a consistent manner to a central location, as well as providing the tools for displaying and archiving the messages. The message logging system has been developed over a decade, and has been run successfully on CDF and CMS experiments. The most recent work to the message logging system is to build it as a stand-alone package with the name MessageFacility which works for any generic framework or applications, with NOνA as the first driving user. System designs and architectures, as well as the efforts of making it a generic library will be discussed. We also present new features that have been added.

  6. Statistical Physics, Optimization, Inference, and Message-Passing Algorithms : Lecture Notes of the Les Houches School of Physics : Special Issue, October 2013

    Ricci-Tersenghi, Federico; Zdeborova, Lenka; Zecchina, Riccardo; Tramel, Eric W; Cugliandolo, Leticia F

    2015-01-01

    This book contains a collection of the presentations that were given in October 2013 at the Les Houches Autumn School on statistical physics, optimization, inference, and message-passing algorithms. In the last decade, there has been increasing convergence of interest and methods between theoretical physics and fields as diverse as probability, machine learning, optimization, and inference problems. In particular, much theoretical and applied work in statistical physics and computer science has relied on the use of message-passing algorithms and their connection to the statistical physics of glasses and spin glasses. For example, both the replica and cavity methods have led to recent advances in compressed sensing, sparse estimation, and random constraint satisfaction, to name a few. This book’s detailed pedagogical lectures on statistical inference, computational complexity, the replica and cavity methods, and belief propagation are aimed particularly at PhD students, post-docs, and young researchers desir...

  7. Can rare SAT formulae be easily recognized? On the efficiency of message-passing algorithms for K-SAT at large clause-to-variable ratios

    Altarelli, Fabrizio; Monasson, Remi; Zamponi, Francesco

    2007-01-01

    For large clause-to-variable ratios, typical K-SAT instances drawn from the uniform distribution have no solution. We argue, based on statistical mechanics calculations using the replica and cavity methods, that rare satisfiable instances from the uniform distribution are very similar to typical instances drawn from the so-called planted distribution, where instances are chosen uniformly between the ones that admit a given solution. It then follows, from a recent article by Feige, Mossel and Vilenchik (2006 Complete convergence of message passing algorithms for some satisfiability problems Proc. Random 2006 pp 339-50), that these rare instances can be easily recognized (in O(log N) time and with probability close to 1) by a simple message-passing algorithm

  8. Nonlinear unknown input sliding mode observer based chaotic system synchronization and message recovery scheme with uncertainty

    Sharma, Vivek; Sharma, B.B.; Nath, R.

    2017-01-01

    In the present manuscript, observer based synchronization and message recovery scheme is discussed for a system with uncertainties. LMI conditions are analytically derived solution of which gives the observer design matrices. Earlier approaches have used adaptive laws to address the uncertainties, however in present work, decoupling approach is used to make observer robust against uncertainties. The methodology requires upper bounds on nonlinearity and the message signal and estimates for these bounds are generated adaptively. Thus no information about the nature of nonlinearity and associated Lipschitz constant is needed in proposed approach. Message signal is recovered using equivalent output injection which is a low pass filtered equivalent of the discontinuous effort required to maintain the sliding motion. Finally, the efficacy of proposed Nonlinear Unknown Input Sliding Mode Observer (NUISMO) for chaotic communication is verified by conducting simulation studies on two chaotic systems i.e. third order Chua circuit and Rossler system.

  9. Readiness of the Defense Message System to Replace the Automatic Digital Network

    1998-01-01

    .... The Defense Information Systems Agency began developing the Defense Message System (DMS) in 1988 to replace messaging functions provided by AUTODIN and electronic mail systems. Audit Objectives...

  10. Alert Messaging in the CMS Distributed Workflow System

    Maxa, Zdenek

    2012-01-01

    WMAgent is the core component of the CMS workload management system. One of the features of this job managing platform is a configurable messaging system aimed at generating, distributing and processing alerts: short messages describing a given alert-worthy information or pathological condition. Apart from the framework's sub-components running within the WMAgent instances, there is a stand-alone application collecting alerts from all WMAgent instances running across the CMS distributed computing environment. The alert framework has a versatile design that allows for receiving alert messages also from other CMS production applications, such as PhEDEx data transfer manager. We present implementation details of the system, including its Python implementation using ZeroMQ, CouchDB message storage and future visions as well as operational experiences. Inter-operation with monitoring platforms such as Dashboard or Lemon is described.

  11. Synchronous message-based communication for distributed heterogeneous systems

    Wilkinson, N.; Dohan, D.

    1992-01-01

    The use of a synchronous, message-based real-time operating system (Unison) as the basis of transparent interprocess and inter-processor communication over VME-bus is described. The implementation of a synchronous, message-based protocol for network communication between heterogeneous systems is discussed. In particular, the design and implementation of a message-based session layer over a virtual circuit transport layer protocol using UDP/IP is described. Inter-process communication is achieved via a message-based semantic which is portable by virtue of its ease of implementation in other operating system environments. Protocol performance for network communication among heterogeneous architecture is presented, including VMS, Unix, Mach and Unison. (author)

  12. Incentive Pass-through for Residential Solar Systems in California

    Dong, C. G. [Univ. of Texas, Austin, TX (United States); Wiser, Ryan [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Rai, Varun [Univ. of Texas, Austin, TX (United States)

    2014-10-01

    The deployment of solar photovoltaic (PV) systems has grown rapidly over the last decade, partly because of various government incentives. In the United States, among the largest and longest-running incentives have been those established in California. Building on past research, this report addresses the still-unanswered question: to what degree have the direct PV incentives in California been passed through from installers to consumers? This report helps address this question by carefully examining the residential PV market in California (excluding a certain class of third-party-owned PV systems) and applying both a structural-modeling approach and a reduced-form regression analysis to estimate the incentive pass-through rate. The results suggest an average pass-through rate of direct incentives of nearly 100%, though with regional differences among California counties. While these results could have multiple explanations, they suggest a relatively competitive market and well-functioning subsidy program. Further analysis is required to determine whether similar results broadly apply to other states, to other customer segments, to all third-party-owned PV systems, or to all forms of financial incentives for solar (considering not only direct state subsidies, but also utility electric bill savings and federal tax incentives).

  13. Secure message authentication system for node to node network

    Sindhu, R.; Vanitha, M. M.; Norman, J.

    2017-10-01

    The Message verification remains some of the best actual methods for prevent the illegal and dis honored communication after presence progressed to WSNs (Wireless Sensor Networks). Intend for this purpose, several message verification systems must stand established, created on both symmetric key cryptography otherwise public key cryptosystems. Best of them will have some limits for great computational then statement above in count of deficiency of climb ability then flexibility in node settlement occurrence. In a polynomial based system was newly presented for these problems. Though, this system then situations delay will must the dimness of integral limitation firm in the point of polynomial: once the amount of message transferred remains the greater than the limitation then the opponent will completely improve the polynomial approaches. This paper suggests using ECC (Elliptic Curve Cryptography). Though using the node verification the technique in this paper permits some nodes to transfer a limitless amount of messages lacking misery in the limit problem. This system will have the message cause secrecy. Equally theoretic study then model effects show our planned system will be effective than the polynomial based method in positions of calculation then statement above in privacy points though message basis privacy.

  14. MESA: Message-Based System Analysis Using Runtime Verification

    Shafiei, Nastaran; Tkachuk, Oksana; Mehlitz, Peter

    2017-01-01

    In this paper, we present a novel approach and framework for run-time verication of large, safety critical messaging systems. This work was motivated by verifying the System Wide Information Management (SWIM) project of the Federal Aviation Administration (FAA). SWIM provides live air traffic, site and weather data streams for the whole National Airspace System (NAS), which can easily amount to several hundred messages per second. Such safety critical systems cannot be instrumented, therefore, verification and monitoring has to happen using a nonintrusive approach, by connecting to a variety of network interfaces. Due to a large number of potential properties to check, the verification framework needs to support efficient formulation of properties with a suitable Domain Specific Language (DSL). Our approach is to utilize a distributed system that is geared towards connectivity and scalability and interface it at the message queue level to a powerful verification engine. We implemented our approach in the tool called MESA: Message-Based System Analysis, which leverages the open source projects RACE (Runtime for Airspace Concept Evaluation) and TraceContract. RACE is a platform for instantiating and running highly concurrent and distributed systems and enables connectivity to SWIM and scalability. TraceContract is a runtime verication tool that allows for checking traces against properties specified in a powerful DSL. We applied our approach to verify a SWIM service against several requirements.We found errors such as duplicate and out-of-order messages.

  15. A Calculus of Communicating Systems with Label Passing

    Engberg, Uffe Henrik; Nielsen, Mogens

    Milner's Calculus of Communicating Systems (CCS) is extended with a mechanism for label passing - as an attempt to remedy some of the shortcomings of CCS w.r.t. dynamic change of agent interconnections. In the extended calculus, restriction is viewed formally as a binder, and the calculus allows...... dynamic change of scope (of label) in connection with communication. It is proved that algebraic properties of strong (and observational) equivalence for CCS are preserved by the extension. Examples illustrating the expressive power of the calculus and its methods for reasoning are given....

  16. NASIS data base management system: IBM 360 TSS implementation. Volume 6: NASIS message file

    1973-01-01

    The message file for the NASA Aerospace Safety Information System (NASIS) is discussed. The message file contains all the message and term explanations for the system. The data contained in the file can be broken down into three separate sections: (1) global terms, (2) local terms, and (3) system messages. The various terms are defined and their use within the system is explained.

  17. NASIS data base management system - IBM 360/370 OS MVT implementation. 6: NASIS message file

    1973-01-01

    The message file for the NASA Aerospace Safety Information System (NASIS) is discussed. The message file contains all the message and term explanations for the system. The data contained in the file can be broken down into three separate sections: (1) global terms, (2) local terms, and (3) system messages. The various terms are defined and their use within the system is explained.

  18. The message architecture of the LEP control system

    Altaber, J.; van der Stok, P.; Frammery, V.; Gareyte, C.; Rausch, R.

    1985-01-01

    The LEP control system will be constructed as a global communication system where microprocessors will be used everywhere, from the management of the communication mechanisms, the execution of complex control procedures, and the supervision of the equipment. To achieve this, the global control problem has been cut into sizeable functions which will be encapsulated into microprocessor modules containing enough hardware for the function to be mostly self-contained. This leads to a function architecture where messages are exchanged between the functions on miscellaneous media. It is shown how these message exchanges can be organized into a uniform flow of data all through the system

  19. Layered virus protection for the operations and administrative messaging system

    Cortez, R. H.

    2002-01-01

    NASA's Deep Space Network (DSN) is critical in supporting the wide variety of operating and plannedunmanned flight projects. For day-to-day operations it relies on email communication between the three Deep Space Communication Complexes (Canberra, Goldstone, Madrid) and NASA's Jet Propulsion Laboratory. The Operations & Administrative Messaging system, based on the Microsoft Windows NTand Exchange platform, provides the infrastructure that is required for reliable, mission-critical messaging. The reliability of this system, however, is threatened by the proliferation of email viruses that continue to spread at alarming rates. A layered approach to email security has been implemented across the DSN to protect against this threat.

  20. Getting the Message? Native Reactive Electrophiles Pass Two Out of Three Thresholds to be Bona Fide Signaling Mediators.

    Poganik, Jesse R; Long, Marcus J C; Aye, Yimon

    2018-05-01

    Precision cell signaling activities of reactive electrophilic species (RES) are arguably among the most poorly-understood means to transmit biological messages. Latest research implicates native RES to be a chemically-distinct subset of endogenous redox signals that influence cell decision making through non-enzyme-assisted modifications of specific proteins. Yet, fundamental questions remain regarding the role of RES as bona fide second messengers. Here, we lay out three sets of criteria we feel need to be met for RES to be considered as true cellular signals that directly mediate information transfer by modifying "first-responding" sensor proteins. We critically assess the available evidence and define the extent to which each criterion has been fulfilled. Finally, we offer some ideas on the future trajectories of the electrophile signaling field taking inspiration from work that has been done to understand canonical signaling mediators. Also see the video abstract here: https://youtu.be/rG7o0clVP0c. © 2018 WILEY Periodicals, Inc.

  1. Message-passing-interface-based parallel FDTD investigation on the EM scattering from a 1-D rough sea surface using uniaxial perfectly matched layer absorbing boundary.

    Li, J; Guo, L-X; Zeng, H; Han, X-B

    2009-06-01

    A message-passing-interface (MPI)-based parallel finite-difference time-domain (FDTD) algorithm for the electromagnetic scattering from a 1-D randomly rough sea surface is presented. The uniaxial perfectly matched layer (UPML) medium is adopted for truncation of FDTD lattices, in which the finite-difference equations can be used for the total computation domain by properly choosing the uniaxial parameters. This makes the parallel FDTD algorithm easier to implement. The parallel performance with different processors is illustrated for one sea surface realization, and the computation time of the parallel FDTD algorithm is dramatically reduced compared to a single-process implementation. Finally, some numerical results are shown, including the backscattering characteristics of sea surface for different polarization and the bistatic scattering from a sea surface with large incident angle and large wind speed.

  2. Project on Alternative Systems Study - PASS. Final report

    1992-10-01

    Alternative repository systems for deep disposal of spent fuel and different types of canisters are studied regarding technical aspects in Project on Alternative System Study (PASS). The objective is to present a ranking of repository systems as well as of canister types for each system. The studies and compared systems are: KBS-3, Medium Long Tunnels (MLH), Long tunnels (VLH) and Deep Boreholes (VDH). For KBS-3 and MLH five canister types are compared (copper/steel, copper/lead, copper (HIP), steel/lead and steel), for VLH two types (copper/steel and steel), and for VDH three types (titanium/concrete with non-consolidated fuel assemblies, titanium/concrete with consolidated assemblies and copper (HIP) with non-consolidated assemblies). The comparison is separated into three sub-comparisons (Technology, Long-term performance and safety, and Costs), which eventually are merged into one ranking. With respect to canister alternatives the result is that the copper/steel canister is ranked first for KBS-3, MLH and VLH, while the titanium/concrete canister is ranked first for VDH (non-consolidated as well as consolidated assemblies. With these canister alternatives the merged ranking of repository systems results in placing KBS-3 slightly in front of MLH. VLH comes thereafter and VDH last. (32 refs.)

  3. Design and Implementation of a Wireless Message Display System

    M. U. M. Bakura

    2016-08-01

    Full Text Available The technology of displaying message is an important part of communication and advertisement. In recent times, Wireless communication has announced its arrival on big stage and the world is going with Smartphone technology. This work describes the design and implementation of a microcontroller based messaging display system. The messaging display system will be interfaced with an android application which will then be used to display information from the comfort of one‘s phone to an LCD screen using the Bluetooth application interface. The work employs the use of an ATMEGA328p Microcontroller mounted on an Arduino board, a Bluetooth Module (HC-06 and an LCD screen. Most of these electronic display systems were using wired cable connections, the Bluetooth technology used in this work is aimed at solving the problem of wired cable connections.The microcontroller provides all the functionality of the display notices and wireless control. A desired text message from a mobile phone is sent via android mobile application to the Bluetooth module located at the receiving end. The Mobile Application was created using online software called App Inventor. When the entire system was connected and tested, it functioned as designed without any noticeable problems. The Bluetooth module responded to commands being sent from the android application appropriately and in a timely manner. The system was able to display 80 characters on the 4 x 20 LCD within the range of 10m as designated by the Bluetooth datasheet.

  4. Running a reliable messaging infrastructure for CERN's control system

    Ehm, F.

    2012-01-01

    The current middle-ware for CERN's Control System is based on 2 implementations: CORBA-based Controls Middle-Ware (CMW) and Java Messaging Service (JMS). The JMS service is realized using the open source messaging product ActiveMQ and had became an increasing vital part of beam operations as data need to be transported reliably for various areas such as the beam protection system, post mortem analysis, beam commissioning or the alarm system. The current JMS service is made of 18 brokers running either in clusters or as single nodes. The main service is deployed as a 2 node cluster providing fail-over and load balancing capabilities for high availability. Non-critical applications running on virtual machines or desktop machines read data via a third broker to decouple the load from the operational main cluster. This scenario has been introduced last year and the statistics showed an up-time of 99.998% and an average data serving rate of 1.6 G-Byte per minute represented by around 150 messages per second. Deploying, running, maintaining and protecting such messaging infrastructure is not trivial and includes setting up of careful monitoring and failure pre-recognition. Naturally, lessons have been learnt and their outcome is very important for the current and future operation of such service. (author)

  5. Online Scheduling in Distributed Message Converter Systems

    Risse, Thomas; Wombacher, Andreas; Surridge, Mike; Taylor, Steve; Aberer, Karl

    The optimal distribution of jobs among hosts in distributed environments is an important factor to achieve high performance. The optimal strategy depends on the application. In this paper we present a new online scheduling strategy for distributed EDI converter system. The strategy is based on the

  6. A Privacy-Preserving NFC Mobile Pass for Transport Systems

    Ghada Arfaoui

    2014-12-01

    Full Text Available The emergence of the NFC (Near Field Communication technology brings new capacities to the next generation of smartphones, but also new security and privacy challenges. Indeed through its contactless interactions with external entities, the smartphone of an individual will become an essential authentication tool for service providers such as transport operators. However, from the point of view of the user, carrying a part of the service through his smartphone could be a threat for his privacy. Indeed, an external attacker or the service provider himself could be tempted to track the actions of the user. In this paper, we propose a privacy-preserving contactless mobile service, in which a user’s identity cannot be linked to his actions when using the transport system. The security of our proposition relies on the combination of a secure element in the smartphone and on a privacy-enhancing cryptographic protocol based on a variant of group signatures. In addition, although a user should remain anonymous and his actions unlinkable in his daily journeys, we designed a technique for lifting his anonymity in extreme circumstances. In order to guarantee the usability of our solution, we implemented a prototype demonstrating that our solution meets the major functional requirements for real transport systems: namely that the mobile pass can be validated at a gate in less than 300 ms, and this even if the battery of the smartphone is exhausted.

  7. Effects of Data Passing Semantics and Operating System Structure on Network I/O Performance

    Brustoloni, Jose

    1997-01-01

    .... Researchers have often proposed changing the semantics of I/O data passing, so as to make copying unnecessary, or the structure of the operating system, so as to reduce or eliminate data and control passing...

  8. Technical Evaluation Report 6: Chat and Instant Messaging Systems

    Jennifer Stein

    2002-04-01

    Full Text Available Text-based conferencing can be both asynchronous (i.e., participants log into the conference at separate times, and synchronous (i.e., interaction takes place in real time. It is thus subject to the same wide variation as the online audio- and video-conferencing methods (see the earlier Reports in this series. Synchronous text-based approaches (e.g., online chat groups and instant messaging systems are highly popular among online users generally owing to their ability to bring together special-interest groups from around the world without cost. In distance education (DE, however, synchronous chat methods are less widely used, owing in part to the problems of arranging for working adults in different time zones to join a discussion group simultaneously. Instant text messaging is more popular among DE users in view of the choice it provides between responding to a message immediately (synchronous communication or after a delay (asynchronous. The different synchronous and asynchronous approaches are likely to become more widely used in parallel with one another, as they are integrated in individual product packages.

  9. Two Women with Multiple Disabilities Communicate with Distant Partners via a Special Text Messaging System

    Lancioni, Giulio E.; O'Reilly, Mark F.; Singh, Nirbhay N.; Sigafoos, Jeff; Green, Vanessa A.; Oliva, Doretta; Alberti, Gloria; Carrella, Luigina

    2013-01-01

    This study extended the research on a special text messaging system, which allows persons with multiple disabilities to (a) write and send messages to distant partners and (b) have messages from those partners read out to them. The study involved two women with multiple disabilities (including blindness or minimal residual vision). The system…

  10. MMS: An electronic message management system for emergency response

    Andersen, H.B.; Garde, H.; Andersen, V.

    1998-01-01

    among messages can be viewed in a graphic tree-like display. By employing the extensive filtration facilities offered by the MMS. users are able to monitor the current status of messages. And, in general, filtration provides users with means of surveying a possibly large number of responses to messages...... contingency plan and procedures to be applied during predefined stages of an emergency....

  11. Speech overlap detection in a two-pass speaker diarization system

    Huijbregts, M.A.H.; Leeuwen, D.A. van; Jong, F. M. G de

    2009-01-01

    In this paper we present the two-pass speaker diarization system that we developed for the NIST RT09s evaluation. In the first pass of our system a model for speech overlap detection is gen- erated automatically. This model is used in two ways to reduce the diarization errors due to overlapping

  12. Speech overlap detection in a two-pass speaker diarization system

    Huijbregts, M.; Leeuwen, D.A. van; Jong, F.M.G. de

    2009-01-01

    In this paper we present the two-pass speaker diarization system that we developed for the NIST RT09s evaluation. In the first pass of our system a model for speech overlap detection is generated automatically. This model is used in two ways to reduce the diarization errors due to overlapping

  13. Validation of the computerized annunciation message list system (CAMLS)

    Feher, M P; Davey, E C; Lupton, L R [AECL, Chalk River Labs., Chalk River, ON (Canada)

    1997-09-01

    The Computerized Annunciation Message List System is a computerized annunciation system for the control rooms of nuclear generating stations. CAMLS will alert operators to changes in plant conditions that may impact on safety and production and help staff to effectively respond. CAMLS is designed to: provide a clear and concise overview of the current problems or faults in the plant; provide an overview of the current state of the plant in terms of automatic process and equipment actions; provide support for specific operational tasks, through either pre-configured or operator-configured annunciation displays, including: rapid and efficient upset response, plant stabilization, problem diagnosis, recovery action planning and implementation, and rapid recovery from trip and return to power operation. To achieve this, several information processing, presentation,a nd interaction concepts were developed. 2 refs, 6 figs, 7 tabs.

  14. Validation of the computerized annunciation message list system (CAMLS)

    Feher, M.P.; Davey, E.C.; Lupton, L.R.

    1997-01-01

    The Computerized Annunciation Message List System is a computerized annunciation system for the control rooms of nuclear generating stations. CAMLS will alert operators to changes in plant conditions that may impact on safety and production and help staff to effectively respond. CAMLS is designed to: provide a clear and concise overview of the current problems or faults in the plant; provide an overview of the current state of the plant in terms of automatic process and equipment actions; provide support for specific operational tasks, through either pre-configured or operator-configured annunciation displays, including: rapid and efficient upset response, plant stabilization, problem diagnosis, recovery action planning and implementation, and rapid recovery from trip and return to power operation. To achieve this, several information processing, presentation,a nd interaction concepts were developed. 2 refs, 6 figs, 7 tabs

  15. Space Shuttle Program Primary Avionics Software System (PASS) Success Legacy - Quality and Reliability Date

    Orr, James K.; Peltier, Daryl

    2010-01-01

    Thsi slide presentation reviews the avionics software system on board the space shuttle, with particular emphasis on the quality and reliability. The Primary Avionics Software System (PASS) provides automatic and fly-by-wire control of critical shuttle systems which executes in redundant computers. Charts given show the number of space shuttle flights vs time, PASS's development history, and other charts that point to the reliability of the system's development. The reliability of the system is also compared to predicted reliability.

  16. Error message recording and reporting in the SLC control system

    Spencer, N.; Bogart, J.; Phinney, N.; Thompson, K.

    1985-01-01

    Error or information messages that are signaled by control software either in the VAX host computer or the local microprocessor clusters are handled by a dedicated VAX process (PARANOIA). Messages are recorded on disk for further analysis and displayed at the appropriate console. Another VAX process (ERRLOG) can be used to sort, list and histogram various categories of messages. The functions performed by these processes and the algorithms used are discussed

  17. Error message recording and reporting in the SLC control system

    Spencer, N.; Bogart, J.; Phinney, N.; Thompson, K.

    1985-04-01

    Error or information messages that are signaled by control software either in the VAX host computer or the local microprocessor clusters are handled by a dedicated VAX process (PARANOIA). Messages are recorded on disk for further analysis and displayed at the appropriate console. Another VAX process (ERRLOG) can be used to sort, list and histogram various categories of messages. The functions performed by these processes and the algorithms used are discussed

  18. A Survey of Rollback-Recovery Protocols in Message-Passing Systems

    1999-06-01

    and M.A. Castillo. "Checkpointing through garbage collection." Technical report. Departamento de Ciencia de la Computation, Escuela de Ingenieria ...between consecutive checkpoints. It can be implemented by using the dirty-bit of the memory protection hardware or by emulating a dirty-bit in software [4...compare the program’s state with the previous checkpoint in software , and writing the difference in a new checkpoint [46]. The required storage and

  19. Real-time mobile customer short message system design and implementation

    Han, Qirui; Sun, Fang

    To expand the current mobile phone short message service, and to make the contact between schools, teachers, parents and feedback of the modern school office system more timely and conveniently, designed and developed the Short Message System based on the Linux platform. The state-of-the-art principles and designed proposals in the Short Message System based on the Linux platform are introduced. Finally we propose an optimized secure access authentication method. At present, many schools,vbusinesses and research institutions ratify the promotion and application the messaging system gradually, which has shown benign market prospects.

  20. Multi-pass amplifier architecture for high power laser systems

    Manes, Kenneth R; Spaeth, Mary L; Erlandson, Alvin C

    2014-04-01

    A main amplifier system includes a first reflector operable to receive input light through a first aperture and direct the input light along an optical path. The input light is characterized by a first polarization. The main amplifier system also includes a first polarizer operable to reflect light characterized by the first polarization state. The main amplifier system further includes a first and second set of amplifier modules. Each of the first and second set of amplifier modules includes an entrance window, a quarter wave plate, a plurality of amplifier slablets arrayed substantially parallel to each other, and an exit window. The main amplifier system additionally includes a set of mirrors operable to reflect light exiting the first set of amplifier modules to enter the second set of amplifier modules and a second polarizer operable to reflect light characterized by a second polarization state.

  1. Method of treatment in a system passing radioactive material

    Kamiya, K; Kinoshita, M; Asakura, Y

    1976-05-14

    A method to ensure the safety of the reactor and reduce radiation exposure dose by preventing oxygen hydrogen reaction of the reactor off-gas and accumulation of the radioactive material is described. Substances which are accumulated in an off-gas duct and are likely to capture radioactive material (for instance Pd catalyst falling from a recombiner) is changed into a stable material (for instance, PdI/sub 2/) which is hot likely to capture radioactive material through reaction with a stabilizer (for instance, I/sub 2/, Cl/sub 2/, HCl, etc.). This stabilized material is washed off the atomic power plant system.

  2. Evaluating user experiences of the secure messaging tool on the Veterans Affairs' patient portal system.

    Haun, Jolie N; Lind, Jason D; Shimada, Stephanie L; Martin, Tracey L; Gosline, Robert M; Antinori, Nicole; Stewart, Max; Simon, Steven R

    2014-03-06

    The United States Department of Veterans Affairs has implemented an electronic asynchronous "Secure Messaging" tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients' experiences and preferences for using Secure Messaging. The objectives of this mixed-methods study were to (1) characterize veterans' experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans' use of Secure Messaging. We recruited 33 veterans who had access to and had previously used the portal's Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants' computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends. The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using Secure Messaging, and (4) suggestions for improving

  3. Nurses' perception of how an e-message system influences cross-sectoral communication

    Petersen, Helle V; Foged, Signe; Madsen, Annette L

    2018-01-01

    AIM: To investigate hospital and home care nurses' experiences on how an e-message system influences cross-sectoral communication 2 years after introduction. BACKGROUND: Cross-sectoral communication is identified as the main barrier for high quality in transitional care. An e-message system......-message system was used in both sectors but did not promote cross-sectoral dialogue. The home care nurses expressed distrust in the information from the hospital. The hospital nurses' intention was to provide relevant and accurate information but their main focus was to fulfil the standards within the system...... rather than the quality of the information exchanged. CONCLUSIONS: The e-message system supports a one-way information flow, rather than the intended loop of information exchange and dialogue. IMPLICATIONS FOR NURSING MANAGEMENT: Nurse managers should recognise that although an e-message system is being...

  4. Characteristics of electronic patient-provider messaging system utilisation in an urban health care organisation

    Sean Patrick Mikles

    2014-12-01

    Full Text Available Introduction Research suggests that electronic messaging can improve patient engagement. Studies indicate that a ‘digital divide’ may exist, where certain patient populations may be using electronic messaging less frequently. This study aims to determine which patient characteristics are associated with different levels of usage of an electronic patient-provider messaging system in a diverse urban population.Methods Cross-sectional electronic health record data were extracted for patients 10 years of age or older who live in New York City and who visited a set of clinics between 1 July 2011 and 30 June 2012. Regression analyses determined which participant characteristics were associated with the sending of electronic messages.Results Older, female, English-speaking participants of white race who received more messages, had any diagnoses, more office visits and a provider who sent messages were more likely to send more messages. Non-Millennial, non-white participants who received fewer messages, had more office visits, any diagnoses, a provider who saw fewer patients with patient portal accounts, lived in a low socioeconomic status neighbourhood, and did not have private insurance were more likely to send zero messages.Conclusion This study found significant differences in electronic messaging usage based on demographic, socioeconomic and health-related patient characteristics. Future studies are needed to support these results and determine the causes of observed associations.

  5. HL7 Messaging Engine with Customizable Translation System

    PRODAN, R.

    2010-05-01

    Full Text Available This paper introduces a new client-server messaging engine used to exchange clinical data between various medical software applications. Our portal uses the HL7 (Health Level Seven messaging standard to provide translated clinical data to HL7 and non-HL7 client applications. We used HL7 because this standard is worldwide used to facilitate the communication between clinical applications.

  6. Evaluating User Experiences of the Secure Messaging Tool on the Veterans Affairs’ Patient Portal System

    Lind, Jason D; Shimada, Stephanie L; Martin, Tracey L; Gosline, Robert M; Antinori, Nicole; Stewart, Max; Simon, Steven R

    2014-01-01

    Background The United States Department of Veterans Affairs has implemented an electronic asynchronous “Secure Messaging” tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients’ experiences and preferences for using Secure Messaging. Objective The objectives of this mixed-methods study were to (1) characterize veterans’ experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans’ use of Secure Messaging. Methods We recruited 33 veterans who had access to and had previously used the portal’s Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants’ computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends. Results The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using

  7. Using Instant Messaging Systems as a Platform for Electronic Voting

    Meletiadou, Anastasia; Grimm, Rüdiger

    Many Instant Messaging (IM) systems like Skype or Spark offer ex tended services such as file sharing, VoIP, or a shared whiteboard. As the name suggests, IM applications are predominantly used for spontaneous text-based communication for private or business purposes. In this paper we explore their potential to serve as platforms for secure collaborative applications like electronic contract negotiation, e-payment or electronic voting. Such applications have to deal with challenges like time constraints (“instant” com munication is desired), integration of media channels and the absence of one uni fying “sphere of control” covering all participants. In this paper, we address these challenges by discussing one particular secure collaborative application: secure decision processes for small groups. We provide the following contribu tions: (1) we define three varying scenarios and corresponding security require ments (2) we present an IM-based architecture implementing these scenarios, in cluding a Video-based authentication mechanism, and (3) we discuss poten tial attack patterns.

  8. Mobile Messaging Services-Based Personal Electrocardiogram Monitoring System

    Ashraf A. Tahat

    2009-01-01

    Full Text Available A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services.

  9. Mobile messaging services-based personal electrocardiogram monitoring system.

    Tahat, Ashraf A

    2009-01-01

    A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs) with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG) signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services.

  10. Research of reducing the shielding effect caused by vehicles passing the radioactivity monitor system

    Deng Xianqi; Li Jianmin; Wang Xiaobing

    2008-01-01

    A kind of Radioactivity Monitor System with Vehicle Contour Acquisition Module based on Optical Screen is developed. The system can reduce the shielding effect caused by the passing vehicles, so that the alarming sensitivity is improved. This paper introduces the work situation of the system and preliminary experimental results. (authors)

  11. A Scalable and Reliable Message Transport Service for the ATLAS Trigger and Data Acquisition System

    Kazarov, A; The ATLAS collaboration; Kolos, S; Lehmann Miotto, G; Soloviev, I

    2014-01-01

    The ATLAS Trigger and Data Acquisition (TDAQ) is a large distributed computing system composed of several thousands of interconnected computers and tens of thousands applications. During a run, TDAQ applications produce a lot of control and information messages with variable rates, addressed to TDAQ operators or to other applications. Reliable, fast and accurate delivery of the messages is important for the functioning of the whole TDAQ system. The Message Transport Service (MTS) provides facilities for the reliable transport, the filtering and the routing of the messages, basing on publish-subscribe-notify communication pattern with content-based message filtering. During the ongoing LHC shutdown, the MTS was re-implemented, taking into account important requirements like reliability, scalability and performance, handling of slow subscribers case and also simplicity of the design and the implementation. MTS uses CORBA middleware, a common layer for TDAQ infrastructure, and provides sending/subscribing APIs i...

  12. Modifying the behaviour of minix system calls through the redirection of messages

    Pessolani, Pablo Andrés

    2011-01-01

    Minix 3 is an open-source operating system designed to be highly reliable, flexible, and secure. The kernel is small and user processes, specialized servers and device drivers runs as user-mode isolated processes. Minix is a client/server operating system that uses message transfers as communication primitives between processes. Minix system calls send messages to request for services to the Process Manager Server (PM) or the File System Server (FS), and then waiting for the results. The requ...

  13. A Wireless Text Messaging System Improves Communication for Neonatal Resuscitation.

    Hughes Driscoll, Colleen A; Schub, Jamie A; Pollard, Kristi; El-Metwally, Dina

    Handoffs for neonatal resuscitation involve communicating critical delivery information (CDI). The authors sought to achieve ≥95% communication of CDI during resuscitation team requests. CDI included name of caller, urgency of request, location of delivery, gestation of fetus, status of amniotic fluid, and indication for presence of the resuscitation team. Three interventions were implemented: verbal scripted handoff, Spök text messaging, and Engage text messaging. Percentages of CDI communications were analyzed using statistical process control. Following implementation of Engage, the communication of all CDI, except for indication, was ≥95%; communication of indication occurred 93% of the time. Control limits for most CDI were narrower with Engage, indicating greater reliability of communication compared to the verbal handoff and Spök. Delayed resuscitation team arrival, a countermeasure, was not higher with text messaging compared to verbal handoff ( P = 1.00). Text messaging improved communication during high-risk deliveries, and it may represent an effective tool for other delivery centers.

  14. Emergency Message Dissemination System for Smartphones During Natural Disasters

    Wu, Xian; Mazurowski, Maciej; Chen, Zhen; Meratnia, Nirvana

    This paper revolves around the concept of utilizing the modern smartphone communication capabilities to transmit messages through an ad hoc network during a disaster, which renders the traditional cellular base station inaccessible. Due to dynamic and decentralized nature of the considered

  15. Development of a portable remote sensing system for measurement of diesel emissions from passing diesel trucks.

    2011-04-08

    A wireless remote-sensing system has been developed for measurement of NOx and particulate matters (PM) emissions from passing diesel trucks. The NOx measurement system has a UV light source with quartz fiber optics that focused the light source into...

  16. Performance of single-pass and by-pass multi-step multi-soil-layering systems for low-(C/N)-ratio polluted river water treatment.

    Wei, Cai-Jie; Wu, Wei-Zhong

    2018-09-01

    Two kinds of hybrid two-step multi-soil-layering (MSL) systems loaded with different filter medias (zeolite-ceramsite MSL-1 and ceramsite-red clay MSL-2) were set-up for the low-(C/N)-ratio polluted river water treatment. A long-term pollutant removal performance of these two kinds of MSL systems was evaluated for 214 days. By-pass was employed in MSL systems to evaluate its effect on nitrogen removal enhancement. Zeolite-ceramsite single-pass MSL-1 system owns outstanding ammonia removal capability (24 g NH 4 + -Nm -2 d -1 ), 3 times higher than MSL-2 without zeolite under low aeration rate condition (0.8 × 10 4  L m -2 .h -1 ). Aeration rate up to 1.6 × 10 4  L m -2 .h -1 well satisfied the requirement of complete nitrification in first unit of both two MSLs. However, weak denitrification in second unit was commonly observed. By-pass of 50% influent into second unit can improve about 20% TN removal rate for both MSL-1 and MSL-2. Complete nitrification and denitrification was achieved in by-pass MSL systems after addition of carbon source with the resulting C/N ratio up to 2.5. The characters of biofilms distributed in different sections inside MSL-1 system well illustrated the nitrogen removal mechanism inside MSL systems. Two kinds of MSLs are both promising as an appealing nitrifying biofilm reactor. Recirculation can be considered further for by-pass MSL-2 system to ensure a complete ammonia removal. Copyright © 2018 Elsevier Ltd. All rights reserved.

  17. Application of optimization methods for nuclear energy system performance assessment by the MESSAGE software

    Andrianov, A.A.; Kuptsov, I.S.; Utyanskaya, T.V.

    2016-01-01

    This paper defines the multi-objective optimization and uncertainty treatment modules for the IAEA energy planning software MESSAGE intended for multi-objective optimization and sustainability assessments of innovative nuclear energy systems with account of uncertainty [ru

  18. The Canal da Piracema at Itaipu Dam as a fish pass system

    Sérgio Makrakis

    Full Text Available The Canal da Piracema is the longest (nearly 10 km fish pass system in the world. The construction of this fish pass was somehow controversial, because it connected two distinct ichthyofaunistic provinces. This study evaluated the ichthyofauna present in the Canal da Piracema and the abundance and distribution of long-distance migratory fish species along this fish pass system (evaluated possible selectivity. The Canal da Piracema was shown to be difficult to sample because of its environmental heterogeneity: artificial ponds, ladders and nature-like fish pass. To solve this problem, we used several fishing gears, adequate for the several biotopes present (unstructured and structured littoral were sampled with seining nets and electrofishing; lentic were sampled with gillnets and longlines (deeper areas; and rapid water areas were sampled with cast nets. The ichthyofauna of the Canal da Piracema followed the pattern for South America and the Paraná River, with a predominance of Characiformes and Siluriformes. The most representative families were Characidae, Anostomidae, Pimelodidae and Loricariidae. We captured 116 species (17 were long-distance migratory during the period studied. Small-sized species were predominant in unstructured and structured littoral areas, especially Bryconamericus exodon and Apareiodon affinis.The most abundant species was Hypostomus spp. in lentic areas, followed by Iheringichthys labrosus. Hoplias aff. malabaricus predominated in deeper lentic areas. Long-distance migratory species were abundant in rapid waters; they were Prochilodus lineatus and Leporinus elongatus. The sharp reduction in the number of species, including migratory ones, is an indication that the Canal da Piracema is selecting the species that ascend it. Therefore, the search for information on the efficiency of the various fish passes present in the Canal da Piracema is fundamental, to facilitate upward movements of fish. If this is reached, this

  19. Structural Controls of the Emerson Pass Geothermal System, Washoe County, Nevada

    Anderson, Ryan B [Nevada Bureau of Mines and Geology, University of Nevada, Reno; Faulds, James E [Nevada Bureau of Mines and Geology, University of Nevada, Reno

    2012-09-30

    We have conducted a detailed geologic study to better characterize a blind geothermal system in Emerson Pass on the Pyramid Lake Paiute Tribe Reservation, western Nevada. A thermal anomaly was discovered in Emerson Pass by use of 2 m temperature surveys deployed within a structurally favorable setting and proximal to surface features indicative of geothermal activity. The anomaly lies at the western edge of a broad left step at the northeast end of Pyramid Lake between the north- to north-northeast-striking, west-dipping, Fox and Lake Range normal faults. The 2-m temperature surveys have defined a N-S elongate thermal anomaly that has a maximum recorded temperature of ~60°C and resides on a north- to north-northeaststriking fault. Travertine mounds, chalcedonic silica veins, and silica cemented Pleistocene lacustrine gravels in Emerson Pass indicate a robust geothermal system active at the surface in the recent past. Structural complexity and spatial heterogeneities of the strain and stress field have developed in the step-over region, but kinematic data suggest a WNW-trending (~280° azimuth) extension direction. The geothermal system is likely hosted in Emerson Pass as a result of enhanced permeability generated by the intersection of two oppositely dipping, southward terminating north- to north-northwest-striking (Fox Range fault) and northnortheast- striking faults.

  20. 3D characterization of a Great Basin geothermal system: Astor Pass, NV

    Siler, D. L.; Mayhew, B.; Faulds, J. E.

    2012-12-01

    The Great Basin exhibits both anomalously high heat flow (~75±5 mWm-2) and active faulting and extension resulting in robust geothermal activity. There are ~430 known geothermal systems in the Great Basin, with evidence suggesting that undiscovered blind geothermal systems may actually represent the majority of geothermal activity. These systems employ discrete fault intersection/interaction areas as conduits for geothermal circulation. Recent studies show that steeply dipping normal faults with step-overs, fault intersections, accommodation zones, horse-tailing fault terminations and transtensional pull-aparts are the most prominent structural controls of Great Basin geothermal systems. These fault geometries produce sub-vertical zones of high fault and fracture density that act as fluid flow conduits. Structurally controlled fluid flow conduits are further enhanced when critically stressed with respect to the ambient stress conditions. The Astor Pass blind geothermal system, northwestern Nevada, lies along the boundary between the Basin and Range to the east and the Walker Lane to the west. Along this boundary, strain is transferred from dextral shear in the Walker Lane to west-northwest directed extension in the Basin and Range. As such, the Astor Pass area lies in a transtensional setting consisting of both northwest-striking, left-stepping dextral faults and more northerly striking normal faults. The Astor Pass tufa tower implies the presence of a blind geothermal system. Previous studies suggest that deposition of the Astor Pass tufa was controlled by the intersection of a northwest-striking dextral normal fault and north-northwest striking normal fault. Subsequent drilling (to ~1200 m) has revealed fluid temperatures of ~94°C, confirming the presence of a blind geothermal system at Astor Pass. Expanding upon previous work and employing additional detailed geologic mapping, interpretation of 2D seismic reflection data and analysis of well cuttings, a 3

  1. Policy Analysis Screening System (PASS) demonstration: sample queries and terminal instructions

    None

    1979-10-16

    This document contains the input and output for the Policy Analysis Screening System (PASS) demonstration. This demonstration is stored on a portable disk at the Environmental Impacts Division. Sample queries presented here include: (1) how to use PASS; (2) estimated 1995 energy consumption from Mid-Range Energy-Forecasting System (MEFS) data base; (3) pollution projections from Strategic Environmental Assessment System (SEAS) data base; (4) diesel auto regulations; (5) diesel auto health effects; (6) oil shale health and safety measures; (7) water pollution effects of SRC; (8) acid rainfall from Energy Environmental Statistics (EES) data base; 1990 EIA electric generation by fuel type; sulfate concentrations by Federal region; forecast of 1995 SO/sub 2/ emissions in Region III; and estimated electrical generating capacity in California to 1990. The file name for each query is included.

  2. Design of Instant Messaging System of Multi-language E-commerce Platform

    Yang, Heng; Chen, Xinyi; Li, Jiajia; Cao, Yaru

    2017-09-01

    This paper aims at researching the message system in the instant messaging system based on the multi-language e-commerce platform in order to design the instant messaging system in multi-language environment and exhibit the national characteristics based information as well as applying national languages to e-commerce. In order to develop beautiful and friendly system interface for the front end of the message system and reduce the development cost, the mature jQuery framework is adopted in this paper. The high-performance server Tomcat is adopted at the back end to process user requests, and MySQL database is adopted for data storage to persistently store user data, and meanwhile Oracle database is adopted as the message buffer for system optimization. Moreover, AJAX technology is adopted for the client to actively pull the newest data from the server at the specified time. In practical application, the system has strong reliability, good expansibility, short response time, high system throughput capacity and high user concurrency.

  3. Decision aids for enhancing intergovernmental interactions: The Prenotification Analysis Support System (PASS)

    Lester, M.; Liebow, E.; Holm, J.

    1994-01-01

    The Department of Energy (DOE) plans to honor its commitment to government-to-government interactions by providing advance notice of DOE spent fuel and high-level waste shipments to Indian tribes whose jurisdictions are crossed by or adjacent to transportation routes. The tribes are important contributors to a regional response network, and providing tribes with advance notice of DOE shipping plans marks the start -- not the end -- of direct, government-to-government interactions with DOE. The Tribal Prenotification Analysis Support System (PASS) is being developed for the Office of Special Programs within the Department's Office of Environmental Restoration and Waste Management. PASS will help DOE-Headquarters to coordinate field office activities and provide technical and institutional support to the DOE field offices. PASS is designed to be used by anyone with minimum computer literacy and having contemporary computer hardware and software. It uses on-screen maps to choose and display a shipment route, and to display the tribal jurisdictions. With forms that are easy to understand, it provides information about each jurisdiction and points of contact. PASS records all contacts, commitments made, and actions taken

  4. Decision-aids for enhancing intergovernmental interactions: The Pre-notification Analysis Support System (PASS)

    Lester, M.; Liebow, E.; Holm, J.

    1994-05-01

    The Department of Energy (DOE) plans to honor its commitment to government-to-government interactions by providing advance notice of DOE spent fuel and high-level waste shipments to Indian tribes whose jurisdictions are crossed by or adjacent to transportation routes. The tribes are important contributors to a regional response network, and providing tribes with advance notice of DOE shipping plans marks the start -- not the end -- of direct, government-to-government interactions with DOE. The Tribal Prenotification Analysis Support System (PASS) is being developed for the Office of Special Programs within the Department's Office of Environmental Restoration and Waste Management. PASS will help DOE-Headquarters to coordinate field office activities and provide technical and institutional support to the DOE field offices. PASS is designed to be used by anyone with minimum computer literacy and having contemporary computer hardware and software. It uses on-screen maps to choose and display a shipment route, and to display the tribal jurisdictions. With forms that are easy to understand, it provides information about each jurisdiction and points of contact. PASS records all contacts, commitments made, and actions taken

  5. The Defense Messaging System (DMS) in the Navy Regional Enterprise Messaging System (NREMS) environment evidence that size does matter in DoD business process engineering

    Ramsey, Avonna S.

    2007-01-01

    Since the migration of DOD messaging to the DMS has been mandated, implementation has been less than ideal and otherwise unsuccessful. DMS users have reported dissatisfaction with the systems maintenance and security support burdens in the current client-server model. NREMS introduces a networked environment capable of push technology and centralized database and security management which should significantly reduce the DMS shortfalls that have made the system lack appeal to the end user. As ...

  6. Statistical Requirements For Pass-Fail Testing Of Contraband Detection Systems

    Gilliam, David M.

    2011-01-01

    Contraband detection systems for homeland security applications are typically tested for probability of detection (PD) and probability of false alarm (PFA) using pass-fail testing protocols. Test protocols usually require specified values for PD and PFA to be demonstrated at a specified level of statistical confidence CL. Based on a recent more theoretical treatment of this subject [1], this summary reviews the definition of CL and provides formulas and spreadsheet functions for constructing tables of general test requirements and for determining the minimum number of tests required. The formulas and tables in this article may be generally applied to many other applications of pass-fail testing, in addition to testing of contraband detection systems.

  7. A Customized Workflow-Driven Instant Messaging System Support Team Communication in the Hospital.

    Lee, Ying-Li; Chien, Tsai-Feng; Chen, Hsiu-Chin

    2016-01-01

    Effective communication among the healthcare team is a very important skill to support team resource management (TRM). However, we take too much effort to connect with other team members by using traditional telephone communication. In this study, we developed an instant messaging system embedded in the original hospital information system and evaluated the preliminary outcome and the usage of the system.

  8. A Two-Pass Exact Algorithm for Selection on Parallel Disk Systems.

    Mi, Tian; Rajasekaran, Sanguthevar

    2013-07-01

    Numerous OLAP queries process selection operations of "top N", median, "top 5%", in data warehousing applications. Selection is a well-studied problem that has numerous applications in the management of data and databases since, typically, any complex data query can be reduced to a series of basic operations such as sorting and selection. The parallel selection has also become an important fundamental operation, especially after parallel databases were introduced. In this paper, we present a deterministic algorithm Recursive Sampling Selection (RSS) to solve the exact out-of-core selection problem, which we show needs no more than (2 + ε ) passes ( ε being a very small fraction). We have compared our RSS algorithm with two other algorithms in the literature, namely, the Deterministic Sampling Selection and QuickSelect on the Parallel Disks Systems. Our analysis shows that DSS is a (2 + ε )-pass algorithm when the total number of input elements N is a polynomial in the memory size M (i.e., N = M c for some constant c ). While, our proposed algorithm RSS runs in (2 + ε ) passes without any assumptions. Experimental results indicate that both RSS and DSS outperform QuickSelect on the Parallel Disks Systems. Especially, the proposed algorithm RSS is more scalable and robust to handle big data when the input size is far greater than the core memory size, including the case of N ≫ M c .

  9. Key technologies of the server monitor and control system based on GSM short messages

    Chen Taiwei; Zhou Zhenliu; Liu Baoxu

    2007-01-01

    The network management based on SNMP protocol cannot effectively monitor and control application-system states and key-process states on the computer server. Furthermore, it needs the administrator's longtime surveillance. When the administrator leaves the computer, he can't receive the malfunction message in time. In this paper we present a server monitor and control system based on monitor agents and GSM short messages, introduce the key technology to realize it, and implement a model system in the real network environment. (authors)

  10. Application of closed queueing network in the performance of a pick-and-pass order picking system

    Gaast, van der J.P.; Koster, de M.B.M.; Adan, I.J.B.F.; Resing, J.A.C.

    2011-01-01

    This paper presents a method for obtaining approximate solutions for pick-and-pass order picking systems with multiple classes of orders. The pick-and-pass system is decomposed into an entrance station, conveyor nodes and pick stations. A customer order needs to visit multiple pick stations, but the

  11. Single-pass BPM system of the Photon Factory storage ring.

    Honda, T; Katoh, M; Mitsuhashi, T; Ueda, A; Tadano, M; Kobayashi, Y

    1998-05-01

    At the 2.5 GeV ring of the Photon Factory, a single-pass beam-position monitor (BPM) system is being prepared for the storage ring and the beam transport line. In the storage ring, the injected beam position during the first several turns can be measured with a single injection pulse. The BPM system has an adequate performance, useful for the commissioning of the new low-emittance lattice. Several stripline BPMs are being installed in the beam transport line. The continuous monitoring of the orbit in the beam transport line will be useful for the stabilization of the injection energy as well as the injection beam orbit.

  12. Three-Dimensional Geologic Characterization of a Great Basin Geothermal System: Astor Pass, Nevada

    Mayhew, Brett; Siler, Drew L; Faulds, James E

    2013-09-30

    The Great Basin, western USA, exhibits anomalously high heat flow (~75±5 mWm-2) and active faulting and extension, resulting in ~430 known geothermal systems. Recent studies have shown that steeply dipping normal faults in transtensional pull-aparts are a common structural control of these Great Basin geothermal systems. The Astor Pass blind (no surface expression) geothermal system, Nevada, lies along the boundary between the Basin and Range to the east and the Walker Lane to the west. Across this boundary, strain is transferred from dextral shear in the Walker Lane to west-northwest directed extension in the Basin and Range, resulting in a transtensional setting consisting of both northwest-striking, left-stepping dextral faults and northerly striking normal faults. Previous studies indicate that Astor Pass was controlled by the intersection of a northwest-striking dextral normal fault and north-northwest striking normal-dextral fault bounding the western side of the Terraced Hills. Drilling (to ~1200 m) has revealed fluid temperatures of ~94°C, confirming a blind geothermal system. Expanding upon previous work and employing interpretation of 2D seismic reflection data, additional detailed geologic mapping, and well cuttings analysis, a 3-dimensional geologic model of the Astor Pass geothermal system was constructed. The 3D model indicates a complex interaction/intersection area of three discrete fault zones: a northwest-striking dextral-normal fault, a north-northwest-striking normal-dextral fault, and a north-striking west-dipping normal fault. These two discrete, critically-stressed intersection areas plunge moderately to steeply to the NW-NNW and probably act as conduits for upwelling geothermal fluids.

  13. Implementation of Pass Through PPTP Relay System with Authentication at Each Gateway and Its Performance Evaluations

    Saito, Shoichi; Uehara, Tetsutaro; Izumi, Yutaka; Kunieda, Yoshitoshi

    The VPN (Virtual Private Network) technique becomes more and more popular to protect contents of messages and to achieve secure communication from incidents, such as tapping. However, it grow in usage that a VPN server is used on a sub-network in part of an office-wide network. But, a PPTP system included in Windows operating systems cannot establish nested VPN links. Moreover encrypted communication by VPN hides a user of the VPN connection. Consequently, any administrators of network systems can’t find out the users of the VPN connection via firewall, moreover can’t decide whether if the user is legal or not. In order to solve this problem, we developed a multi step PPTP relay system on a firewall. This system solves all the problems of our previously developed PPTP relay system(1). The new relay system improves security by encrypting through the whole end-to-end communication and abolishing of prior registration of passwords for the next step. Furthermore, transport speed is accelerated, and the restriction of the number of steps on relay is also abolished. By these features the multi step PPTP relay system expands usability.

  14. A scalable and practical one-pass clustering algorithm for recommender system

    Khalid, Asra; Ghazanfar, Mustansar Ali; Azam, Awais; Alahmari, Saad Ali

    2015-12-01

    KMeans clustering-based recommendation algorithms have been proposed claiming to increase the scalability of recommender systems. One potential drawback of these algorithms is that they perform training offline and hence cannot accommodate the incremental updates with the arrival of new data, making them unsuitable for the dynamic environments. From this line of research, a new clustering algorithm called One-Pass is proposed, which is a simple, fast, and accurate. We show empirically that the proposed algorithm outperforms K-Means in terms of recommendation and training time while maintaining a good level of accuracy.

  15. Study of the spectral bandwidth of a double-pass acousto-optic system [Invited].

    Champagne, Justine; Kastelik, Jean-Claude; Dupont, Samuel; Gazalet, Joseph

    2018-04-01

    Acousto-optic tunable filters are known as efficient instruments for spectral and spatial filtering of light. In this paper, we analyze the bandwidth dependence of a double-pass filter. The interaction geometry chosen allows the simultaneous diffraction of the ordinary and the extraordinary optical modes by a single ultrasonic frequency. We present the main parameters of a custom device (design, optical range, driving frequency) and experimental results concerning the angular deviation of the beams including the effect of optical birefringence. The spectral resolution and the side lobes' significance are discussed. Spectral bandwidth of such a system is analyzed.

  16. Experience in Modelling Nuclear Energy Systems with MESSAGE: Country Case Studies

    2018-01-01

    Member States have recognized the increasing need to model future nuclear power scenarios in order to develop strategies for sustainable nuclear energy systems. The IAEA model for energy supply strategy alternatives and their general environmental impacts (MESSAGE) code is a tool that supports energy analysis and planning in Member States. This publication documents the experience gained on modelling and scenario analysis of nuclear energy systems (NES) using the MESSAGE code through various case studies performed by the participating Member States on evaluation and planning for nuclear energy sustainability at the regional or national level. The publication also elaborates on experience gained in modelling of global nuclear energy systems with a focus on specific aspects of collaboration among technology holder and technology user countries and the introduction of innovative nuclear technologies. It presents country case studies covering a variety of nuclear energy systems based on a once-through fuel cycle and a closed fuel cycle for thermal reactors, fast reactors and advanced systems. The feedback from case studies proves the analytical capabilities of the MESSAGE model and highlight the path forward for further advancements in the MESSAGE code and NES modelling.

  17. A privacy protection for an mHealth messaging system

    Aaleswara, Lakshmipathi; Akopian, David; Chronopoulos, Anthony T.

    2015-03-01

    In this paper, we propose a new software system that employs features that help the organization to comply with USA HIPAA regulations. The system uses SMS as the primary way of communication to transfer information. Lack of knowledge about some diseases is still a major reason for some harmful diseases spreading. The developed system includes different features that may help to communicate amongst low income people who don't even have access to the internet. Since the software system deals with Personal Health Information (PHI) it is equipped with an access control authentication system mechanism to protect privacy. The system is analyzed for performance to identify how much overhead the privacy rules impose.

  18. A critical analysis of the X.400 model of message handling systems

    van Sinderen, Marten J.; Dorregeest, Evert

    1988-01-01

    The CCITT X.400 model of store and forward Message Handling Systems (MHS) serves as a common basis for the definition of electronic mail services and protocols both within CCITT and ISO. This paper presents an analysis of this model and its related recommendations from two perspectives. First the

  19. Technical Evaluation Report 14: Chat and Instant Messaging Systems (synchronous: Report 2/ 3

    Ellen Kinsel

    2002-10-01

    Full Text Available This study extends the earlier review of online chat systems (Report 6, by reviewing a further seven products that provide text-based instant messaging (IM. The functionality of these products in distance education contexts is stressed in relation to their comparative costs, complexity, control, clarity, technical framework, and other functional options.

  20. The Synthesis Method of Automated System of Operational Planning in Low-Space Communication System Messaging

    Serhii Kovbasiuk

    2017-04-01

    Full Text Available One of the reasons for the decrease of efficiency in low-speed communication systems, satellite communication, which are based on nanoplatform is a high degree of operational planning centralisation. To overcome this problem the method which carries out the distribution of tasks of communications operational planning minimizing the exchange of information between spatially remote sites, and takes into account the computing performance of software and hardware was developed. The technique is based on the use of methods of structural and parametric synthesis, simulation and statistical analysis of the results. Its use allows to obtain the optimal structure of the automated system of operational planning in low-space communication system messaging evaluation of efficiency in terms of fixed communication of information load.

  1. Egg incubator control system with short message service (sms) fault ...

    The egg incubator system with temperature sensor can measure the state of the incubator and automatically change to the suitable condition for the egg. The health of the egg is very important for the development of embryo. The status condition in the incubator system will appear on the liquid crystal display (LCD) screen.

  2. Design of a solar-assisted drying system using the double-pass solar collector

    Sopian, K.; Daud, W.R.; Supranto; Othman, M.Y.; Yatim, B.

    2000-01-01

    A solar-assisted drying system that uses the double-pass solar collector with porous media in the second channel has been designed and constructed at the Solar Energy Research Park, Universiti Kebangsaan Malaysia. The drying system has a total of six double-pass solar collectors. Each collector has a length of 240 cm and a width of 120 cm. The upper channel depth is 3.5 cm and the lower channel depth is 10.5 cm. The lower channel is filled up with steel wool as the porous media. The solar collectors are arranged as 2 banks of 3 collectors each in series. Internal manifold are used to connect the collectors. An auxiliary heater source is installed to supply heat under unfavourable solar radiation conditions. An on/off controller is used to control the startup and shutdown of the auxiliary heater. An outlet temperature of 80-90 0 C can be achieved at a solar radiation range of 800-900 W/m 3 , ambient temperature of 29 degree C and flow rate of O.20 kg/s. (Author)

  3. Installing a HDPE vertical containment and collection system in one pass utilizing a deep trencher

    Bocchino, W.M.; Burson, B.

    1997-01-01

    A unique method has been developed to install high density polyethylene (HDPE) vertical containment panels and a horizontal collection system for the containment and collection of contaminated groundwater. Unlike other means of creating this type of system, this barrier wall and collection system is installed in one step and in one narrow trench, utilizing a one-pass deep trencher. Originally HDPE vertical barriers were installed using conventional slurry trenching techniques. Use of this method raised questions of trench stability and disposal costs for the trench spoils. In addition, if a collection system was desired, a separate trench or vertical wells were required. In response to these concerns, a trenchless vibratory installation method was developed. Although this method addressed the concerns of trench stability and disposal costs, it raised a whole new set of concerns dealing with drivable soil conditions, buried debris and obstructions. Again, if a collection system was desired, a separate trench or vertical wells had to be installed. The latest development, the one-pass, deep trencher, has eliminated or significantly reduced the previously discussed construction concerns. The trencher methods reduce the amount of spoils generated because a trench width of 61 cm (24 inches) is constantly maintained by the machine. Additionally, soil classification and density are not as critical as with a vibratory installation. This is due to the trencher's ability to trench in all but the hardest of materials (blow counts exceeding 35 blows/ft). Finally, the cost to add a collection system adjacent to the cutoff wall is substantially reduced and is limited only to the cost of the additional hydraulic fill and 4 inches HDPE collection piping. The trench itself is already constructed with the installation of the wall

  4. A CORBA sharing and messaging server-client information system

    Fernandes, H.; Pereira, J.P.A.; Varandas, C.A.F.

    2002-01-01

    The design and implementation of a CORBA (Common Object Request Broker Architecture) system has been evaluated to control and remotely operate experiments through an internet/intranet connection. The main objective of this framework is to share an experiment in a multi-user environment, possibly running over a supervisor administration. This should be done in a scalable and extensible framework for data acquisition, independent of conditions such as network infrastructures, operating system or data exchange protocols

  5. Applying a message oriented middleware architecture to the TJ-II remote participation system

    Sanchez, E.; Portas, A.; Pereira, A.; Vega, J.

    2006-01-01

    A message oriented middleware (MOM) has been introduced into the TJ-II data acquisition system to on-line distribute information. Java message service (JMS) has been chosen as the messaging application program interface (API) in order to ensure multiplatform portability. A library of C++ classes providing interface for JMS Java classes has been developed. This allows C++ programs to inter-communicate through JMS. In addition, a set of C wrapper functions has also been developed to provide basic messaging functionalities for C or FORTRAN programs. These functions are used in TJ-II LabView data acquisition applications. Several software applications that take advantage of the MOM architecture have been developed. Firstly, a general-user application allows monitoring of the data acquisition systems. Secondly, a simple application permits the visualization of TJ-II monitor signals with on-line data refreshing. These applications are written in the Java language, thereby ensuring its portability. These software tools provide new functionalities to the TJ-II remote participation system and are equally used in the local environment

  6. Applying a message oriented middleware architecture to the TJ-II remote participation system

    Sanchez, E. [Asociacion EURATOM/CIEMAT para Fusion, Avda Complutense 22, 28040 Madrid (Spain)]. E-mail: edi.sanchez@ciemat.es; Portas, A. [Asociacion EURATOM/CIEMAT para Fusion, Avda Complutense 22, 28040 Madrid (Spain); Pereira, A. [Asociacion EURATOM/CIEMAT para Fusion, Avda Complutense 22, 28040 Madrid (Spain); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Avda Complutense 22, 28040 Madrid (Spain)

    2006-07-15

    A message oriented middleware (MOM) has been introduced into the TJ-II data acquisition system to on-line distribute information. Java message service (JMS) has been chosen as the messaging application program interface (API) in order to ensure multiplatform portability. A library of C++ classes providing interface for JMS Java classes has been developed. This allows C++ programs to inter-communicate through JMS. In addition, a set of C wrapper functions has also been developed to provide basic messaging functionalities for C or FORTRAN programs. These functions are used in TJ-II LabView data acquisition applications. Several software applications that take advantage of the MOM architecture have been developed. Firstly, a general-user application allows monitoring of the data acquisition systems. Secondly, a simple application permits the visualization of TJ-II monitor signals with on-line data refreshing. These applications are written in the Java language, thereby ensuring its portability. These software tools provide new functionalities to the TJ-II remote participation system and are equally used in the local environment.

  7. Design and implementation of modular home security system with short messaging system

    Budijono Santoso

    2014-03-01

    Full Text Available Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home. It is therefore the purpose of this design to provide home security device, which send fast information to user GSM (Global System for Mobile mobile device using SMS (Short Messaging System and also activate - deactivate system by SMS. The Modular design of this Home Security System make expandable their capability by add more sensors on that system. Hardware of this system has been designed using microcontroller AT Mega 328, PIR (Passive Infra Red motion sensor as the primary sensor for motion detection, camera for capturing images, GSM module for sending and receiving SMS and buzzer for alarm. For software this system using Arduino IDE for Arduino and Putty for testing connection programming in GSM module. This Home Security System can monitor home area that surrounding by PIR sensor and sending SMS, save images capture by camera, and make people panic by turn on the buzzer when trespassing surrounding area that detected by PIR sensor. The Modular Home Security System has been tested and succeed detect human movement.

  8. Conflicting demands of No Child Left Behind and state systems: Mixed messages about school performance.

    Robert L. Linn

    2005-01-01

    An ever-increasing reliance on student performance on tests holds schools and educators accountable both to state accountability systems and also to the accountability requirements of the No Child Left Behind (NCLB) Act of 2001. While each state has constructed its own definition of Adequate Yearly Progress (AYP) requirements within the confines of NCLB, substantial differences between the accountability requirements of many state systems and NCLB still have resulted in mixed messages regardi...

  9. Simple messaging and collaboration system for heterogeneous organizations operating in disaster environments

    Meyer, Ramsey

    2011-01-01

    Approved for public release; distribution is unlimited. A novel communication system for use by a wide variety of first responders in disaster response is described. The system is based primarily on SMS messaging technologies and either indigenous mobile phone service providers or mobile phone service brought in via cellular-on-wheels (COWs), UAVs, rapidly deployed towers, etc. End users use either their own cell phones, running a native SMS application, or low-cost phones that are dist...

  10. Message Embedded Chaotic Masking Synchronization Scheme Based on the Generalized Lorenz System and Its Security Analysis

    Čelikovský, Sergej; Lynnyk, Volodymyr

    2016-01-01

    Roč. 26, č. 8 (2016), 1650140-1-1650140-15 ISSN 0218-1274 R&D Projects: GA ČR GA13-20433S Institutional support: RVO:67985556 Keywords : Chaotic masking * generalized Lorenz system * message embedded synchronization Subject RIV: BC - Control Systems Theory Impact factor: 1.329, year: 2016 http://library.utia.cas.cz/separaty/2016/TR/celikovsky-0461536.pdf

  11. Feasibility of a Modified E-PASS and POSSUM System for Postoperative Risk Assessment in Patients with Spinal Disease.

    Chun, Dong Hyun; Kim, Do Young; Choi, Sun Kyu; Shin, Dong Ah; Ha, Yoon; Kim, Keung Nyun; Yoon, Do Heum; Yi, Seong

    2018-04-01

    This retrospective case control study aimed to evaluate the feasibility of using Estimation of Physiological Ability and Surgical Stress (E-PASS) and Physiological and Operative Severity Score for the enumeration of Mortality and Morbidity (POSSUM) systems in patients undergoing spinal surgical procedures. Degenerative spine disease has increased in incidence in aging societies, as has the number of older adult patients undergoing spinal surgery. Many older adults are at a high surgical risk because of comorbidity and poor general health. We retrospectively reviewed 217 patients who had undergone spinal surgery at a single tertiary care. We investigated complications within 1 month after surgery. Criteria for both skin incision in E-PASS and operation magnitude in the POSSUM system were modified to fit spine surgery. We calculated the E-PASS and POSSUM scores for enrolled patients, and investigated the relationship between postoperative complications and both surgical risk scoring systems. To reinforce the predictive ability of the E-PASS system, we adjusted equations and developed modified E-PASS systems. The overall complication rate for spinal surgery was 22.6%. Forty-nine patients experienced 58 postoperative complications. Nineteen major complications, including hematoma, deep infection, pleural effusion, progression of weakness, pulmonary edema, esophageal injury, myocardial infarction, pneumonia, reoperation, renal failure, sepsis, and death, occurred in 17 patients. The area under the receiver operating characteristic curve (AUC) for predicted postoperative complications after spine surgery was 0.588 for E-PASS and 0.721 for POSSUM. For predicted major postoperative complications, the AUC increased to 0.619 for E-PASS and 0.842 for POSSUM. The AUC of the E-PASS system increased from 0.588 to 0.694 with the Modified E-PASS equation. The POSSUM system may be more useful than the E-PASS system for estimating postoperative surgical risk in patients undergoing

  12. A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems

    Jaimez, Marc; Esparza, Oscar; Muñoz, Jose L.; Alins-Delgado, Juan J.; Mata-Díaz, Jorge

    Mobile agents are software entities consisting of code, data, state and itinerary that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. In particular, collusion attacks have been barely studied in the literature. This paper presents a mechanism that avoids collusion attacks based on code passing. Our proposal is based on a Multi-Code agent, which contains a different variant of the code for each host. A Trusted Third Party is responsible for providing the information to extract its own variant to the hosts, and for taking trusted timestamps that will be used to verify time coherence.

  13. Passing excellence

    Tsoupikova, Daria

    2007-02-01

    This paper describes the research and development of a virtual reality visualization project "Passing excellence" about the world famous architectural ensemble "Kizhi". The Kizhi Pogost is located on an island in Lake Onega in northern Karelia in Russia. It is an authentic museum of an ancient wood building tradition which presents a unique artistic achievement. This ensemble preserves a concentration of masterpieces of the Russian heritage and is included in the List of Most Endangered Sites of the World Monuments Watch protected by World Heritage List of UNESCO. The project strives to create a unique virtual observation of the dynamics of the architectural changes of the museum area beginning from the 15th Century up to the 21st Century. The visualization is being created to restore the original architecture of Kizhi island based on the detailed photographs, architectural and geometric measurements, textural data, video surveys and resources from the Kizhi State Open-Air Museum archives. The project is being developed using Electro, an application development environment for the tiled display high-resolution graphics visualization system and can be shown on the virtual reality systems such as the GeoWall TM and the C-Wall.

  14. Technical Evaluation Reports 15. Chat and Instant Messaging Systems (synchronous: Report 3/ 3

    Brian Ludwig

    2002-10-01

    Full Text Available [Previous reviews of chat and IM systems are presented in Reports 6 and 14 in this series.]A further set of four text-based instant messaging (IM products was evaluated: AT&T Anywhere, Parachat, Sonork, and Yahoo Messenger, all available at no cost. Yahoo Messenger was judged to be the most effective of the three products for use by distance education (DE teachers and students, being compatible with most common operating systems and accommodating up to 50 chat room participants. Yahoo Messenger also possesses integrated audio and video capabilities. AT&T Anywhere is an efficient product, which supports Windows-based operating systems only. Parachat (Basic version is a basic, browser accessed chat board without instant messaging (IM capabilities.

  15. Virtual file system on NoSQL for processing high volumes of HL7 messages.

    Kimura, Eizen; Ishihara, Ken

    2015-01-01

    The Standardized Structured Medical Information Exchange (SS-MIX) is intended to be the standard repository for HL7 messages that depend on a local file system. However, its scalability is limited. We implemented a virtual file system using NoSQL to incorporate modern computing technology into SS-MIX and allow the system to integrate local patient IDs from different healthcare systems into a universal system. We discuss its implementation using the database MongoDB and describe its performance in a case study.

  16. Ontology-Driven Instant Messaging-Based Dialogue System for Device Control

    Noguera-Arnaldos, José Ángel

    2015-10-14

    The im4Things platform aims to develop a communication interface for devices in the Internet of the Things (IoT) through intelligent dialogue based on written natural language over instant messaging services. This type of communication can be established in different ways such as order sending and, status querying. Also, the devices themselves are responsible for alerting users when a change has been produced in the device’s sensors. The system has been validated and it has obtained promising results.

  17. The application of coloured Petri nets to verification of distributed systems specified by message Sequence Charts

    CHERNENOK S.A.; NEPOMNIASCHY V.A.

    2015-01-01

    The language of message sequence charts (MSC) is a popular scenario-based specification language used to describe the interaction of components in distributed systems. However, the methods for validation of MSC diagrams are underdeveloped. This paper describes a method for translation of MSC diagrams into coloured Petri nets (CPN). The method is applied to the property verification of these diagrams. The considered set of diagram elements is extended by the elements of UML sequence diagrams a...

  18. Analysis of Parking Reliability Guidance of Urban Parking Variable Message Sign System

    Zhenyu Mei; Ye Tian; Dongping Li

    2012-01-01

    Operators of parking guidance and information systems (PGIS) often encounter difficulty in determining when and how to provide reliable car park availability information to drivers. Reliability has become a key factor to ensure the benefits of urban PGIS. The present paper is the first to define the guiding parking reliability of urban parking variable message signs (VMSs). By analyzing the parking choice under guiding and optional parking lots, a guiding parking reliability model was constru...

  19. Clogging and unclogging of many-particle systems passing through a bottleneck

    Zuriguel Iker

    2017-01-01

    Full Text Available When a group of discrete particles pass through a narrowing, the flow may become arrested due to the development of structures that span over the size of the aperture. Then, it is said that the system is clogged. Here, we will discuss about the existence of a phase diagram for the clogged state that has been recently proposed, arguing on its usefulness to describe different systems of discrete bodies ranging from granular materials, to colloidal suspensions and live beings. This diagram is built based on the value of a flowing parameter which characterizes the intermittent flow observed in all these discrete systems provided that there is an external or internal energy supply. Such requirement, which is necessary to destabilize the clogging arches, is absent in a standard static silo, which is therefore examined as a particular case. This view will help to understand some a priori inconsistencies concerning the role of driving force in the clogging process that have been found in the last years.

  20. Design and implementation of a children vaccination reminder system based on short message service

    Marjan Ghazisaeedi

    2016-09-01

    Full Text Available Background: Most problems related to quality of care and patient safety are related to human negligence. One of the causes of these problems is forgetting to do something. This problem can be avoided with information technology in many cases. Some forgotten are very important. Among these is failure to comply with vaccination schedule by parents that can result in inappropriate outcomes. In this study, we developed and evaluated a SMS reminder system for regular and timely vaccination of children. Methods: In this developmental-applied research, firstly, a child vaccination reminder system was designed and implemented to help parents reduce the forgetfulness. This system based on the child's vaccination history and the date of birth, offer time and type of future vaccines. Then the parents of 27 children, that their vaccination was between 22 June and 21 August 2015, referred to Children's Medical Center, were sent text messages by using this system. We evaluated the accuracy of the system logic by using some scenarios. In addition, we evaluated parents' satisfaction with the system using a questionnaire. Results: In all cases but one, the system proposed the type and date of future children vaccines correctly. All the parents who have received text messages had good perception and satisfaction on the majority of questions (total mean score of 4.15 out of 5. Most parents (4.92 out of 5 stated that using the system to remind their visit for child immunization was helpful and willing to offer the system to their friends and other families. Conclusion: Using the short message system is beneficial for parents to remind their children’s vaccination time and increases their satisfaction. So, it can be considered as an important and essential tool in providing healthcare services. SMS is an easy, cheap and effective way to improve the quality of care services.

  1. Development of a Solar Assisted Drying System Using Double-Pass Solar Collector with Finned Absorber

    Azmi, M. S. M.; Othman, M. Y.; Sopian, K.; Ruslan, M. H.; Majid, Z. A. A.; Fudholi, A.; Yasin, J. M.

    2012-09-01

    The Solar Energy Research Group, Universiti Kebangsaan Malaysia, International Islamic University Malaysia and Yayasan FELDA has designed and constructed a solar assisted drying system at OPF FELDA Factory, Felda Bukit Sagu 2, Kuantan, Pahang. The drying system has a total of six double-pass solar collectors. Each collector has a length of 480 cm and a width of 120 cm. The first channel depth is 3.5 cm and the second channel depth is 7 cm. Longitudinal fins made of angle aluminium, 0.8 mm thickness were attached to the bottom surface of the absorber plate. The solar collectors are arranged as two banks of three collectors each in series. Internal manifold are used to connect the collectors. Air enters through the first channel and then through the second channel of the collector. An auxiliary heater source is installed to supply heat under unfavourable solar radiation condition. An on/off controller is used to control the startup and shutdown of the auxiliary heater. An outlet temperature of 70-75 °C can be achieved at solar radiation range of 800-900 W/m2 and flow rate of 0.12 kg/s. The average thermal efficiency of a solar collector is approximately 37%.

  2. Development of a Solar Assisted Drying System Using Double-Pass Solar Collector with Finned Absorber

    Azmi, M S M; Sopian, K; Ruslan, M H; Fudholi, A; Majid, Z A A; Yasin, J M; Othman, M Y

    2012-01-01

    The Solar Energy Research Group, Universiti Kebangsaan Malaysia, International Islamic University Malaysia and Yayasan FELDA has designed and constructed a solar assisted drying system at OPF FELDA Factory, Felda Bukit Sagu 2, Kuantan, Pahang. The drying system has a total of six double-pass solar collectors. Each collector has a length of 480 cm and a width of 120 cm. The first channel depth is 3.5 cm and the second channel depth is 7 cm. Longitudinal fins made of angle aluminium, 0.8 mm thickness were attached to the bottom surface of the absorber plate. The solar collectors are arranged as two banks of three collectors each in series. Internal manifold are used to connect the collectors. Air enters through the first channel and then through the second channel of the collector. An auxiliary heater source is installed to supply heat under unfavourable solar radiation condition. An on/off controller is used to control the startup and shutdown of the auxiliary heater. An outlet temperature of 70–75 °C can be achieved at solar radiation range of 800–900 W/m 2 and flow rate of 0.12 kg/s. The average thermal efficiency of a solar collector is approximately 37%.

  3. The effect of mobile phone short messaging system on healthy food choices among Iranian postmenopausal women.

    Vakili, Mahdis; Abedi, Parvin; Afshari, Poorandokht; Kaboli, Nayereh Esmael

    2015-01-01

    Central adiposity and metabolic syndrome are quite common among postmenopausal women. Dietary diversity and healthy food choices have essential role in health and also in prevention of obesity. The main objective of this study was to evaluate the impact of mobile phone short messaging system on healthy food choices among Iranian postmenopausal women. This was a randomized controlled trial in which 100 postmenopausal women aged 40-60 years were recruited and assigned to two groups (50 each in the intervention and control groups). Food frequency consumption was measured using a questionnaire. A total of 16 text messages including information about modification of food selection (healthy choices, benefits, methods, etc.,) were sent to participants in the intervention group during 4 months follow-up (1/week). The Chi-square and independent t-test used for data analysis. Ninety-two women completed the study. The consumption of Vitamin A rich fruits and vegetables significantly increased in the intervention group compared to the control group (P mobile phone short messaging system can improve the healthy food choices regarding Vitamin A rich fruits and vegetables and fish among postmenopausal women.

  4. The effect of mobile phone short messaging system on healthy food choices among Iranian postmenopausal women

    Mahdis Vakili

    2015-01-01

    Full Text Available Introduction: Central adiposity and metabolic syndrome are quite common among postmenopausal women. Dietary diversity and healthy food choices have essential role in health and also in prevention of obesity. The main objective of this study was to evaluate the impact of mobile phone short messaging system on healthy food choices among Iranian postmenopausal women. Materials and Methods: This was a randomized controlled trial in which 100 postmenopausal women aged 40-60 years were recruited and assigned to two groups (50 each in the intervention and control groups. Food frequency consumption was measured using a questionnaire. A total of 16 text messages including information about modification of food selection (healthy choices, benefits, methods, etc., were sent to participants in the intervention group during 4 months follow-up (1/week. The Chi-square and independent t-test used for data analysis. Ninety-two women completed the study. Results: The consumption of Vitamin A rich fruits and vegetables significantly increased in the intervention group compared to the control group (P < 0.001. More women in the intervention group consumed fish after intervention (P = 0.02. The consumption of green leafy vegetables showed a nonsignificant increase in the intervention group. Conclusion: Using mobile phone short messaging system can improve the healthy food choices regarding Vitamin A rich fruits and vegetables and fish among postmenopausal women.

  5. Public-channel cryptography based on mutual chaos pass filters.

    Klein, Einat; Gross, Noam; Kopelowitz, Evi; Rosenbluh, Michael; Khaykovich, Lev; Kinzel, Wolfgang; Kanter, Ido

    2006-10-01

    We study the mutual coupling of chaotic lasers and observe both experimentally and in numeric simulations that there exists a regime of parameters for which two mutually coupled chaotic lasers establish isochronal synchronization, while a third laser coupled unidirectionally to one of the pair does not synchronize. We then propose a cryptographic scheme, based on the advantage of mutual coupling over unidirectional coupling, where all the parameters of the system are public knowledge. We numerically demonstrate that in such a scheme the two communicating lasers can add a message signal (compressed binary message) to the transmitted coupling signal and recover the message in both directions with high fidelity by using a mutual chaos pass filter procedure. An attacker, however, fails to recover an errorless message even if he amplifies the coupling signal.

  6. Multi-views storage model and access methods of conversation history in converged IP messaging system

    Lu, Meilian; Yang, Dong; Zhou, Xing

    2013-03-01

    Based on the analysis of the requirements of conversation history storage in CPM (Converged IP Messaging) system, a Multi-views storage model and access methods of conversation history are proposed. The storage model separates logical views from physical storage and divides the storage into system managed region and user managed region. It simultaneously supports conversation view, system pre-defined view and user-defined view of storage. The rationality and feasibility of multi-view presentation, the physical storage model and access methods are validated through the implemented prototype. It proves that, this proposal has good scalability, which will help to optimize the physical data storage structure and improve storage performance.

  7. A SECURE MESSAGE TRANSMISSION SYSTEM ARCHITECTURE FOR COMPUTER NETWORKS EMPLOYING SMART CARDS

    Geylani KARDAŞ

    2008-01-01

    Full Text Available In this study, we introduce a mobile system architecture which employs smart cards for secure message transmission in computer networks. The use of smart card provides two security services as authentication and confidentiality in our design. The security of the system is provided by asymmetric encryption. Hence, smart cards are used to store personal account information as well as private key of each user for encryption / decryption operations. This offers further security, authentication and mobility to the system architecture. A real implementation of the proposed architecture which utilizes the JavaCard technology is also discussed in this study.

  8. The clinical usefulness of a web-based messaging system between patients with Crohn disease and their physicians.

    Jeong, Da Eun; Kim, Kyeong Ok; Jang, Byung Ik; Kim, Eun Young; Jung, Jin Tae; Jeon, Seong Woo; Lee, Hyun Seok; Kim, Eun Soo; Park, Kyung Sik; Cho, Kwang Bum

    2016-06-01

    To avoid missing events associated with clinical activity, the authors previously developed a novel, web-based, self-reporting Crohn disease (CD) symptom diary. However, although this diary provided a means of self-checking based on responses to set questions based on Harvey-Bradshaw index scores, it was limited in terms of describing other specific symptoms. Thus, the authors added a space to the questionnaire, which allows patients to send clinicians questions or a description of unpredictable events. The aim of the present study was to assess the clinical usefulness of this messaging system by analyzing patients' messages.The messaging system between patients and their doctors was included in a webpage created for recording patients' symptom diaries (www.cdsd.or.kr). Using this system, patients can send messages easily at any time and doctors can read and respond to these messages immediately using a smart phone or computer. In the present study, the authors retrospectively reviewed 686 messages sent by 152 patients from July 2012 to July 2014 and patient medical records.Mean patient age was 29.0 ± 11.6 years and the male-to-female ratio was 99:53. Most messages regarded symptoms (381 messages, 55.5%), which was followed by self-reports about general condition (195 messages, 28.4%) and questions about treatment (71 messages, 10.3%). With respect to symptoms, abdominal pain was most common (145 cases, 21.1%) followed by hematochezia (36 cases, 5.2%). Problems about medication were the most frequently associated with treatment (65, 91.5%). Patients above 40 years showed a greater tendency to focus on symptoms and treatment (P = 0.025). The doctor answer rate was 56.3% (n = 386), and based on these responses, an early visit was needed in 28 cases (7.3%).Using this web-based messaging system, patients were able to obtain proper advice from their physicians without visiting clinics or searching the Internet, and in addition, 7.3% of messages prompted an early

  9. High peak-power kilohertz laser system employing single-stage multi-pass amplification

    Shan, Bing; Wang, Chun; Chang, Zenghu

    2006-05-23

    The present invention describes a technique for achieving high peak power output in a laser employing single-stage, multi-pass amplification. High gain is achieved by employing a very small "seed" beam diameter in gain medium, and maintaining the small beam diameter for multiple high-gain pre-amplification passes through a pumped gain medium, then leading the beam out of the amplifier cavity, changing the beam diameter and sending it back to the amplifier cavity for additional, high-power amplification passes through the gain medium. In these power amplification passes, the beam diameter in gain medium is increased and carefully matched to the pump laser's beam diameter for high efficiency extraction of energy from the pumped gain medium. A method of "grooming" the beam by means of a far-field spatial filter in the process of changing the beam size within the single-stage amplifier is also described.

  10. Project Alternative Systems Study - PASS. Analysis of performance and long-term safety of repository concepts

    Birgersson, L.; Skagius, K.; Wiborgh, M.; Widen, H.

    1992-09-01

    This study is part of the Project on Alternative Systems Study, PASS, with the overall aim to perform a technical/economical ranking of alternative repository concepts and canisters for the final storage of spent nuclear fuel. The comparison should in the first stage separately assess technology in construction and operation, long-term performance and safety, and costs. Three of the repository concepts are assumed to be located at a depth of approximately 500 m in the host rock, KBS-3, Very Long Holes (VLH) and Medium Long Holes (MLH). In the KBS-3 concept the canisters are deposited in vertical deposition holes in a system of parallel storage tunnels. In the VLH concept larger canisters are deposited in long horizontal tunnels. The MLH concept, is an evolution of the two other concepts, with KBS-3 type canisters deposited in horizontal tunnels. Smaller canisters are to be deposited in deep bore holes at a depth between 2000 to 4000 m in the Very Deep Holes (VDH) concept. In all concepts the canisters will be surrounded by a bentonite buffer. The aim of the present study is to analyze and compare the performance and long-term safety of the repository concepts. Only a qualitative comparison of the concepts is made as no calculations of radionuclide releases or dose to man have been performed. The ranking of the repository concepts was carried out by comparing the VDH, VLH and MLH concept with the KBS-3 concept. The performance and long-term safety of the repositories located at 500 m level will be based on a multiple barrier system and the predictions for the concepts will involve similar uncertainties. (54 refs.)

  11. Actors with Multi-Headed Message Receive Patterns

    Sulzmann, Martin; Lam, Edmund Soon Lee; Van Weert, Peter

    2008-01-01

    style actors with receive clauses containing multi-headed message patterns. Patterns may be non-linear and constrained by guards. We provide a number of examples to show the usefulness of the extension. We also explore the design space for multi-headed message matching semantics, for example first-match......The actor model provides high-level concurrency abstractions to coordinate simultaneous computations by message passing. Languages implementing the actor model such as Erlang commonly only support single-headed pattern matching over received messages. We propose and design an extension of Erlang...... and rule priority-match semantics. The various semantics are inspired by the multi-set constraint matching semantics found in Constraint Handling Rules. This provides us with a formal model to study actors with multi-headed message receive patterns. The system can be implemented efficiently and we have...

  12. Secure communication based on multi-input multi-output chaotic system with large message amplitude

    Zheng, G.; Boutat, D.; Floquet, T.; Barbot, J.P.

    2009-01-01

    This paper deals with the problem of secure communication based on multi-input multi-output (MIMO) chaotic systems. Single input secure communication based on chaos can be easily extended to multiple ones by some combinations technologies, however all the combined inputs possess the same risk to be broken. In order to reduce this risk, a new secure communication scheme based on chaos with MIMO is discussed in this paper. Moreover, since the amplitude of messages in traditional schemes is limited because it would affect the quality of synchronization, the proposed scheme is also improved into an amplitude-independent one.

  13. Real-time digital signal recovery for a multi-pole low-pass transfer function system.

    Lee, Jhinhwan

    2017-08-01

    In order to solve the problems of waveform distortion and signal delay by many physical and electrical systems with multi-pole linear low-pass transfer characteristics, a simple digital-signal-processing (DSP)-based method of real-time recovery of the original source waveform from the distorted output waveform is proposed. A mathematical analysis on the convolution kernel representation of the single-pole low-pass transfer function shows that the original source waveform can be accurately recovered in real time using a particular moving average algorithm applied on the input stream of the distorted waveform, which can also significantly reduce the overall delay time constant. This method is generalized for multi-pole low-pass systems and has noise characteristics of the inverse of the low-pass filter characteristics. This method can be applied to most sensors and amplifiers operating close to their frequency response limits to improve the overall performance of data acquisition systems and digital feedback control systems.

  14. Strong low-pass filtering effects on water vapour flux measurements with closed-path eddy correlation systems

    Ibrom, Andreas; Dellwik, Ebba; Flyvbjerg, Henrik K.

    2007-01-01

    datasets for this substantial measurement error. In contrast to earlier studies, a large number of spectra and raw data have been used in the analysis to define the low-pass filtering characteristic of the EC system. This revealed that the cut-off frequency of the closed-path EC system for water vapour......Turbulent water vapour fluxes measured with closed-path eddy correlation (EC) systems are unintentionally low-pass filtered by the system in a manner that varies with environmental conditions. Why and how is described here. So is the practical method that systematically corrects long-term flux...... concentration measurements decreases exponentially with increasing relative humidity. After correction for this unintended filtering, the fluxes are consistent with CO2 and H2O fluxes that were measured with an open-path sensor at the same time. The correction of water vapour flux measurements over a Beech...

  15. Space Shuttle Program Primary Avionics Software System (PASS) Success Legacy -Major Accomplishments and Lessons Learned

    Orr, James K.

    2010-01-01

    This presentation has shown the accomplishments of the PASS project over three decades and highlighted the lessons learned. Over the entire time, our goal has been to continuously improve our process, implement automation for both quality and increased productivity, and identify and remove all defects due to prior execution of a flawed process in addition to improving our processes following identification of significant process escapes. Morale and workforce instability have been issues, most significantly during 1993 to 1998 (period of consolidation in aerospace industry). The PASS project has also consulted with others, including the Software Engineering Institute, so as to be an early evaluator, adopter, and adapter of state-of-the-art software engineering innovations.

  16. Short term hydroelectric power system scheduling with wind turbine generators using the multi-pass iteration particle swarm optimization approach

    Lee, T.-Y.

    2008-01-01

    This paper uses multi-pass iteration particle swarm optimization (MIPSO) to solve short term hydroelectric generation scheduling of a power system with wind turbine generators. MIPSO is a new algorithm for solving nonlinear optimal scheduling problems. A new index called iteration best (IB) is incorporated into particle swarm optimization (PSO) to improve solution quality. The concept of multi-pass dynamic programming is applied to modify PSO further and improve computation efficiency. The feasible operational regions of the hydro units and pumped storage plants over the whole scheduling time range must be determined before applying MIPSO to the problem. Wind turbine power generation then shaves the power system load curves. Next, MIPSO calculates hydroelectric generation scheduling. It begins with a coarse time stage and searching space and refines the time interval between two time stages and the search spacing pass by pass (iteration). With the cooperation of agents called particles, the near optimal solution of the scheduling problem can be effectively reached. The effects of wind speed uncertainty were also considered in this paper. The feasibility of the new algorithm is demonstrated by a numerical example, and MIPSO solution quality and computation efficiency are compared to those of other algorithms

  17. Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots

    Francisco J. Rodríguez-Lera

    2018-03-01

    Full Text Available In human–robot interaction situations, robot sensors collect huge amounts of data from the environment in order to characterize the situation. Some of the gathered data ought to be treated as private, such as medical data (i.e., medication guidelines, personal, and safety information (i.e., images of children, home habits, alarm codes, etc.. However, most robotic software development frameworks are not designed for securely managing this information. This paper analyzes the scenario of hardening one of the most widely used robotic middlewares, Robot Operating System (ROS. The study investigates a robot’s performance when ciphering the messages interchanged between ROS nodes under the publish/subscribe paradigm. In particular, this research focuses on the nodes that manage cameras and LIDAR sensors, which are two of the most extended sensing solutions in mobile robotics, and analyzes the collateral effects on the robot’s achievement under different computing capabilities and encryption algorithms (3DES, AES, and Blowfish to robot performance. The findings present empirical evidence that simple encryption algorithms are lightweight enough to provide cyber-security even in low-powered robots when carefully designed and implemented. Nevertheless, these techniques come with a number of serious drawbacks regarding robot autonomy and performance if they are applied randomly. To avoid these issues, we define a taxonomy that links the type of ROS message, computational units, and the encryption methods. As a result, we present a model to select the optimal options for hardening a mobile robot using ROS.

  18. Nurses' perspectives on how an e-message system supports cross-sectoral communication in relation to medication administration

    Foged, Signe; Nørholm, Vibeke; Andersen, Ove

    2018-01-01

    AIMS AND OBJECTIVES: The aim was to describe nurses' perspectives on how an e-message system supports communication between hospital and home care nurses in relation to medication administration. BACKGROUND: Medication administration is a complex process involving a high risk of error. Unclear......: The e-message system did not provide the information needed by the home care nurses to ensure safe medication administration after discharge due to (a) limitations of the system, (b) hospital nurses' lack of knowledge about home care nurses' information needs, and (c) hospital nurses' lack of access...... safe medication administration; however, the e-message system did not support exchange of the information needed. This article is protected by copyright. All rights reserved....

  19. Efficient Messaging through Cluster Coordinators in Decentralized Controlled Material Flow Systems

    Lieberoth-Leden Christian

    2016-01-01

    Full Text Available The modularization of the hard- and software is one approach handling the demand for increasing flexibility and changeability of automated material flow systems. A control that is distributed across several different hardware controllers leads to a great demand for coordination between the modules while planning for example transports, especially if there is a mutual dependency between the modules on the executing tasks. Short-term changes in planning often initiate a rescheduling chain reaction, which causes a high communication load in the system. In the presented approach, module clusters with a centralized coordinator are automatically formed out of multiple modules and substitutional take over the surrounding communication for the modules. As a result, they minimize exchanged messages by focusing on the essential information.

  20. Systemic Lupus Erythematosus in Primary Care: An Update and Practical Messages for the General Practitioner

    Gergianaki, Irini; Bertsias, George

    2018-01-01

    Systemic Lupus Erythematosus (SLE) is a complex chronic autoimmune disease that manifests a wide range of organ involvement. Traditionally, the diagnosis and management of SLE is provided at secondary and tertiary centers to ensure prompt initiation of treatment, adequate control of flares and prevention of irreversible organ damage. Notwithstanding, the role of primary care in SLE is also emerging as there are still significant unmet needs such as the diagnostic delay at the community level and the high burden of therapy- and disease-related comorbidities. In the present review, we summarize practical messages for primary care physicians and general practitioners (GPs) concerning early diagnosis and proper referral of patients with SLE. In addition, we discuss the main comorbidities complicating the disease course and the recommended preventative measures, and we also provide an update on the role and current educational needs of GPs regarding the disease. PMID:29896474

  1. Conflicting demands of No Child Left Behind and state systems: Mixed messages about school performance.

    Robert L. Linn

    2005-06-01

    Full Text Available An ever-increasing reliance on student performance on tests holds schools and educators accountable both to state accountability systems and also to the accountability requirements of the No Child Left Behind (NCLB Act of 2001. While each state has constructed its own definition of Adequate Yearly Progress (AYP requirements within the confines of NCLB, substantial differences between the accountability requirements of many state systems and NCLB still have resulted in mixed messages regarding the performance of schools. Several features of NCLB accountability and state accountability systems contribute to the identification of a school as meeting goals according to NCLB but failing to do so according to the state accountability system, or vise versa. These include the multiple hurdles of NCLB, the comparison of performance against a fixed target rather than changes in achievement, and the definition of performance goals. The result of these features is a set of AYP measures that is inconsistent both with existing state accountability systems and also with state NAEP performance. Using existing achievement to set the cut-score measured by AYP and using the highest-performing schools to set the year-to-year improvement standards would improve the NCLB accountability system.

  2. Using a Computer-based Messaging System at a High School To Increase School/Home Communication.

    Burden, Mitzi K.

    Minimal communication between school and home was found to contribute to low performance by students at McDuffie High School (South Carolina). This report describes the experience of establishing a computer-based telephone messaging system in the high school and involving parents, teachers, and students in its use. Additional strategies employed…

  3. Usage of the hybrid encryption in a cloud instant messages exchange system

    Kvyetnyy, Roman N.; Romanyuk, Olexander N.; Titarchuk, Evgenii O.; Gromaszek, Konrad; Mussabekov, Nazarbek

    2016-09-01

    A new approach for constructing cloud instant messaging represented in this article allows users to encrypt data locally by using Diffie - Hellman key exchange protocol. The described approach allows to construct a cloud service which operates only by users encrypted messages; encryption and decryption takes place locally at the user party using a symmetric AES encryption. A feature of the service is the conferences support without the need for messages reecryption for each participant. In the article it is given an example of the protocol implementation on the ECC and RSA encryption algorithms basis, as well as a comparison of these implementations.

  4. Analysis of Nuclear Option in Planning on Java Bali Integrated Electricity System By Using Message Program

    Masdin; Sudi-Ariyanto; Nuryanti

    2004-01-01

    The growth of national energy demand in the future still become a great challenge for energy supply sector in Indonesia. The current energy supply strategy focuses the development and diversification of all energy options including fossil fuel, renewable energy and nuclear energy. Based on the Comprehensive Assessment Of Different Energy Source For Electricity Demand Study (CADES), final energy demand will grow from 4,065 PJ in 2000 to about 8,200 PJ in 2025. In this paper, the analysis of national energy system network will be divided into 2 regions, namely Java Bali region and Outside Java Bali region. Period of time horizon chosen in this study is 25 years (2000 to 2025). Simulation of network system configuration based on minimum objective function criteria was done by using MESSAGE (Model for Energy Supply Strategy Alternatives and their General Environmental Impacts) computer program. The focus of the analysis in this paper is simulation of electricity planning sector for Java Bali region. The result of simulation shows that for scenarios with no limitation on all fuel for power plant, scenario where fuel oil as constant supply for power plant and also configuration with limitation on gas supply, Nuclear Power Plant (NPP) does not appear during the study period using cost parameter set in this study. If there are limitations on gas supply and constrains of emissions (SO 2 and CO 2 ) due to coal combustion, NPP would become competitive and appear at about year 2015. (author)

  5. Ontology-Driven Instant Messaging-Based Dialogue System for Device Control

    Noguera-Arnaldos, José Á ngel; Rodriguez-Garcia, Miguel Angel; Ochoa, José Luis; Paredes-Valverde, Mario André s; Alcaraz-Má rmol, Gema; Valencia-Garcí a, Rafael

    2015-01-01

    The im4Things platform aims to develop a communication interface for devices in the Internet of the Things (IoT) through intelligent dialogue based on written natural language over instant messaging services. This type of communication can

  6. Increasing the Operational Value of Event Messages

    Li, Zhenping; Savkli, Cetin; Smith, Dan

    2003-01-01

    Assessing the health of a space mission has traditionally been performed using telemetry analysis tools. Parameter values are compared to known operational limits and are plotted over various time periods. This presentation begins with the notion that there is an incredible amount of untapped information contained within the mission s event message logs. Through creative advancements in message handling tools, the event message logs can be used to better assess spacecraft and ground system status and to highlight and report on conditions not readily apparent when messages are evaluated one-at-a-time during a real-time pass. Work in this area is being funded as part of a larger NASA effort at the Goddard Space Flight Center to create component-based, middleware-based, standards-based general purpose ground system architecture referred to as GMSEC - the GSFC Mission Services Evolution Center. The new capabilities and operational concepts for event display, event data analyses and data mining are being developed by Lockheed Martin and the new subsystem has been named GREAT - the GMSEC Reusable Event Analysis Toolkit. Planned for use on existing and future missions, GREAT has the potential to increase operational efficiency in areas of problem detection and analysis, general status reporting, and real-time situational awareness.

  7. Analysis of Parking Reliability Guidance of Urban Parking Variable Message Sign System

    Zhenyu Mei

    2012-01-01

    Full Text Available Operators of parking guidance and information systems (PGIS often encounter difficulty in determining when and how to provide reliable car park availability information to drivers. Reliability has become a key factor to ensure the benefits of urban PGIS. The present paper is the first to define the guiding parking reliability of urban parking variable message signs (VMSs. By analyzing the parking choice under guiding and optional parking lots, a guiding parking reliability model was constructed. A mathematical program was formulated to determine the guiding parking reliability of VMS. The procedures were applied to a numerical example, and the factors that affect guiding reliability were analyzed. The quantitative changes of the parking berths and the display conditions of VMS were found to be the most important factors influencing guiding reliability. The parking guiding VMS achieved the best benefit when the parking supply was close to or was less than the demand. The combination of a guiding parking reliability model and parking choice behavior offers potential for PGIS operators to reduce traffic congestion in central city areas.

  8. Trial of real-time locating and messaging system with Bluetooth low energy.

    Arisaka, Naoya; Mamorita, Noritaka; Isonaka, Risa; Kawakami, Tadashi; Takeuchi, Akihiro

    2016-09-14

    Hospital real-time location systems (RTLS) are increasing efficiency and reducing operational costs, but room access tags are necessary. We developed three iPhone 5 applications for an RTLS and communications using Bluetooth low energy (BLE). The applications were: Peripheral device tags, Central beacons, and a Monitor. A Peripheral communicated with a Central using BLE. The Central communicated with a Monitor using sockets on TCP/IP (Transmission Control Protocol/Internet Protocol) via a WLAN (wireless local area network). To determine a BLE threshold level for the received signal strength indicator (RSSI), relationships between signal strength and distance were measured in our laboratory and on the terrace. The BLE RSSI threshold was set at -70 dB, about 10 m. While an individual with a Peripheral moved around in a concrete building, the Peripheral was captured in a few 10-sec units at about 10 m from a Central. The Central and Monitor showed and saved the approach events, location, and Peripheral's nickname sequentially in real time. Remote Centrals also interactively communicate with Peripherals by intermediating through Monitors that found the nickname in the event database. Trial applications using BLE on iPhones worked well for patient tracking, and messaging in indoor environments.

  9. Efficient control of servo pneumatic actuator system utilizing by-pass ...

    The issue of energy saving nowadays is very crucial. Pneumatic systems, constituting an important segment of almost every industry, represent large energy consumers. Also, a significant problem with servo pneumatic actuators is achieving accuracy in positioning. The higher the positioning accuracy, the higher the ...

  10. [Mobile single-pass batch hemodialysis system in intensive care medicine. Reduction of costs and workload in renal replacement therapy].

    Hopf, H-B; Hochscherf, M; Jehmlich, M; Leischik, M; Ritter, J

    2007-07-01

    This paper describes the introduction of a single-pass batch hemodialysis system for renal replacement therapy in a 14 bed intensive care unit. The goals were to reduce the workload of intensive care unit physicians using an alternative and simpler method compared to continuous veno-venous hemodiafiltration (CVVHDF) and to reduce the costs of hemofiltrate solutions (80,650 EUR per year in our clinic in 2005). We describe and evaluate the process of implementation of the system as well as the achieved and prospective savings. We conclude that a close cooperation of all participants (physicians, nurses, economists, technicians) of a hospital can achieve substantial benefits for patients and employees as well as reduce the economic burden of a hospital.

  11. 3D printed drug delivery and testing systems - a passing fad or the future?

    Lim, Seng Han; Kathuria, Himanshu; Tan, Justin Jia Yao; Kang, Lifeng

    2018-05-18

    The US Food and Drug Administration approval of the first 3D printed tablet in 2015 has ignited growing interest in 3D printing, or additive manufacturing (AM), for drug delivery and testing systems. Beyond just a novel method for rapid prototyping, AM provides key advantages over traditional manufacturing of drug delivery and testing systems. These includes the ability to fabricate complex geometries to achieve variable drug release kinetics; ease of personalising pharmacotherapy for patient and lowering the cost for fabricating personalised dosages. Furthermore, AM allows fabrication of complex and micron-sized tissue scaffolds and models for drug testing systems that closely resemble in vivo conditions. However, there are several limitations such as regulatory concerns that may impede the progression to market. Here, we provide an overview of the advantages of AM drug delivery and testing, as compared to traditional manufacturing techniques. Also, we discuss the key challenges and future directions for AM enabled pharmaceutical applications. Copyright © 2018 Elsevier B.V. All rights reserved.

  12. [Comparison of ocular modulation transfer function measurements by ray tracing wavefront technology and double-pass system].

    Qiao, Liya; Cai, Xiaogu; Wan, Xiuhua; Guan, Zheng; Xiong, Ying; Lin, Zhong; Zhang, Ye; Tan, Jiaxuan; Wang, Ningli

    2015-01-01

    To compare the agreement of the ocular modulation transfer function (MTF) measured by double-pass system and ray tracing wavefront aberrometry, and to analyze the correlations of two MTFs with the visual acuity and contrast sensitivity function results. Comparative study. Subjects with no ocular diseases were consecutively enrolled in an epidemic study field located at the Dongyangzhuang Health Center, Yongnian County, Handan City, Hebei Province, China. After comprehensive ophthalmic examinations, the mean values of subtracted lower order aberration MTF at 5, 10, 15, 20, 25, and 30 cycle/degree(c/d) spatial frequencies were obtained with a double-pass system (optical quality analysis system II, OQAS II system) and a ray tracing wavefront aberrometer (iTrace visual function analyzer, iTrace system) in the 4.0 mm and 6.0 mm pupil after dilation, respectively. Paired-sample t test and Bland-Altman analysis were used to compare the difference and agreement of MTFs obtained with two instruments. Correlation analysis was preformed between two MTF measurement results and subjective visual quality including visual acuity and contrast sensitivity function. Two hundred and fifty-one healthy eyes of 163 subjects were enrolled, aged 30 to 60, mean (44.1 ± 9.7) years, including 139 eyes of 81 males and 112 eyes of 82 females. The mean value of MTF at 5, 10, 15, 20.25, 30 c/d obtained by iTrace in 4.0 mm pupil were 0.730 ± 0.138, 0.431 ± 0.159, 0.262 ± 0.120, 0.169 ± 0.078, 0.118 ± 0.053, 0.094 ± 0.043. The value obtained by OQASII were 0.347 ± 0.123, 0.162 ± 0.086, 0.072 ± 0.049, 0.042 ± 0.033, 0.026 ± 0.022, 0.017 ± 0.022, The result of iTrace were all significant higher than OQAS in both 4mm(t = 38.72, 28.03, 27.32, 27.59, 29.23, 28.96, P < 0.01) and 6.0 mm(t = 4.60, 3.19, 9.34, 13.41, 16.96, 20.24, P < 0.01)pupil diameter. The iTrace-OQAS II MTF difference was smaller in the 6.0 mm pupil. Bland-Altman analysis indicated that the agreement of two instruments was

  13. On Low-Pass Phase Noise Mitigation in OFDM System for mmWave Communications

    Chen, Xiaoming; Fan, Wei; Zhang, Anxue

    2017-01-01

    A phase noise (PN) mitigation scheme was proposed for orthogonal frequency division multiplexing (OFDM) in a previous work. The proposed scheme does not require detailed knowledge of PN statistics and can eectively compensate the PN with sucient number of unknowns. In this paper, we analyze....... It is also shown that the PN spectral shape of the phase-lockedloop (PLL) based oscillator also aects the PN mitigation and that a larger PN may not necessarily degrade the performance of the OFDM system with PN mitigation. Simulations with realistic millimeter-wave (mmWave) PN and channel models...

  14. The Symbolic Role of Organizational Message Artifacts in a Communication System Assessment.

    Meyer, John C.

    This paper calls for the inclusion of narrative, thematic, and metaphor analysis as organizational assessment or communication audit methods and discusses some practical means of integrating these symbolic interpretational devices. The paper begins by defining the notion of symbol as the message content important to the organizational member. It…

  15. Subtle Messages.

    Tamplin de Poinsot, Nan

    1999-01-01

    Describes a self-portrait assignment inspired by the work of Frida Kahlo. Discusses Frida Kahlo's artwork and use of surrealist and symbolist views. States that each student had to incorporate personal symbolism in the portrait to convey a message about him or herself in a subtle manner. (CMK)

  16. Proposing Wavelet-Based Low-Pass Filter and Input Filter to Improve Transient Response of Grid-Connected Photovoltaic Systems

    Bijan Rahmani

    2016-08-01

    Full Text Available Available photovoltaic (PV systems show a prolonged transient response, when integrated into the power grid via active filters. On one hand, the conventional low-pass filter, employed within the integrated PV system, works with a large delay, particularly in the presence of system’s low-order harmonics. On the other hand, the switching of the DC (direct current–DC converters within PV units also prolongs the transient response of an integrated system, injecting harmonics and distortion through the PV-end current. This paper initially develops a wavelet-based low-pass filter to improve the transient response of the interconnected PV systems to grid lines. Further, a damped input filter is proposed within the PV system to address the raised converter’s switching issue. Finally, Matlab/Simulink simulations validate the effectiveness of the proposed wavelet-based low-pass filter and damped input filter within an integrated PV system.

  17. A Messaging Infrastructure for WLCG

    Casey, James; Cons, Lionel; Lapka, Wojciech; Paladin, Massimo; Skaburskas, Konstantin

    2011-01-01

    During the EGEE-III project operational tools such as SAM, Nagios, Gridview, the regional Dashboard and GGUS moved to a communication architecture based on ActiveMQ, an open-source enterprise messaging solution. LHC experiments, in particular ATLAS, developed prototypes of systems using the same messaging infrastructure, validating the system for their use-cases. In this paper we describe the WLCG messaging use cases and outline an improved messaging architecture based on the experience gained during the EGEE-III period. We show how this provides a solid basis for many applications, including the grid middleware, to improve their resilience and reliability.

  18. Development of a text messaging system to improve receipt of survivorship care in adolescent and young adult survivors of childhood cancer.

    Casillas, Jacqueline; Goyal, Anju; Bryman, Jason; Alquaddoomi, Faisal; Ganz, Patricia A; Lidington, Emma; Macadangdang, Joshua; Estrin, Deborah

    2017-08-01

    This study aimed to develop and examine the acceptability, feasibility, and usability of a text messaging, or Short Message Service (SMS), system for improving the receipt of survivorship care for adolescent and young adult (AYA) survivors of childhood cancer. Researchers developed and refined the text messaging system based on qualitative data from AYA survivors in an iterative three-stage process. In stage 1, a focus group (n = 4) addressed acceptability; in stage 2, key informant interviews (n = 10) following a 6-week trial addressed feasibility; and in stage 3, key informant interviews (n = 23) following a 6-week trial addressed usability. Qualitative data were analyzed using a constant comparative analytic approach exploring in-depth themes. The final system includes programmed reminders to schedule and attend late effect screening appointments, tailored suggestions for community resources for cancer survivors, and messages prompting participant feedback regarding the appointments and resources. Participants found the text messaging system an acceptable form of communication, the screening reminders and feedback prompts feasible for improving the receipt of survivorship care, and the tailored suggestions for community resources usable for connecting survivors to relevant services. Participants suggested supplementing survivorship care visits and forming AYA survivor social networks as future implementations for the text messaging system. The text messaging system may assist AYA survivors by coordinating late effect screening appointments, facilitating a partnership with the survivorship care team, and connecting survivors with relevant community resources. The text messaging system has the potential to improve the receipt of survivorship care.

  19. Advanced Messaging Concept Development Basic Safety Message

    Department of Transportation — Contains all Basic Safety Messages (BSMs) collected during the Advanced Messaging Concept Development (AMCD) field testing program. For this project, all of the Part...

  20. DMS message design workshops.

    2009-03-01

    This report summarizes the training conducted statewide regarding the design and display of messages on : dynamic message signs. The training is based on the Dynamic Message Sign Message Design and Display : Manual (0-4023-P3). Researchers developed ...

  1. Getting Your Message Across: Mobile Phone Text Messaging

    Beecher, Constance C.; Hayungs, Lori

    2017-01-01

    Want to send a message that 99% of your audience will read? Many Extension professionals are familiar with using social media tools to enhance Extension programming. Extension professionals may be less familiar with the use of mobile phone text-based marketing tools. The purpose of this article is to introduce SMS (short message system) marketing…

  2. Convergence of Health Level Seven Version 2 Messages to Semantic Web Technologies for Software-Intensive Systems in Telemedicine Trauma Care.

    Menezes, Pedro Monteiro; Cook, Timothy Wayne; Cavalini, Luciana Tricai

    2016-01-01

    To present the technical background and the development of a procedure that enriches the semantics of Health Level Seven version 2 (HL7v2) messages for software-intensive systems in telemedicine trauma care. This study followed a multilevel model-driven approach for the development of semantically interoperable health information systems. The Pre-Hospital Trauma Life Support (PHTLS) ABCDE protocol was adopted as the use case. A prototype application embedded the semantics into an HL7v2 message as an eXtensible Markup Language (XML) file, which was validated against an XML schema that defines constraints on a common reference model. This message was exchanged with a second prototype application, developed on the Mirth middleware, which was also used to parse and validate both the original and the hybrid messages. Both versions of the data instance (one pure XML, one embedded in the HL7v2 message) were equally validated and the RDF-based semantics recovered by the receiving side of the prototype from the shared XML schema. This study demonstrated the semantic enrichment of HL7v2 messages for intensive-software telemedicine systems for trauma care, by validating components of extracts generated in various computing environments. The adoption of the method proposed in this study ensures the compliance of the HL7v2 standard in Semantic Web technologies.

  3. Wave-optics simulation of the double-pass beam propagation in modulating retro-reflector FSO systems using a corner cube reflector.

    Yang, Guowei; You, Shengzui; Bi, Meihua; Fan, Bing; Lu, Yang; Zhou, Xuefang; Li, Jing; Geng, Hujun; Wang, Tianshu

    2017-09-10

    Free-space optical (FSO) communication utilizing a modulating retro-reflector (MRR) is an innovative way to convey information between the traditional optical transceiver and the semi-passive MRR unit that reflects optical signals. The reflected signals experience turbulence-induced fading in the double-pass channel, which is very different from that in the traditional single-pass FSO channel. In this paper, we consider the corner cube reflector (CCR) as the retro-reflective device in the MRR. A general geometrical model of the CCR is established based on the ray tracing method to describe the ray trajectory inside the CCR. This ray tracing model could treat the general case that the optical beam is obliquely incident on the hypotenuse surface of the CCR with the dihedral angle error and surface nonflatness. Then, we integrate this general CCR model into the wave-optics (WO) simulation to construct the double-pass beam propagation simulation. This double-pass simulation contains the forward propagation from the transceiver to the MRR through the atmosphere, the retro-reflection of the CCR, and the backward propagation from the MRR to the transceiver, which can be realized by a single-pass WO simulation, the ray tracing CCR model, and another single-pass WO simulation, respectively. To verify the proposed CCR model and double-pass WO simulation, the effective reflection area, the incremental phase, and the reflected beam spot on the transceiver plane of the CCR are analyzed, and the numerical results are in agreement with the previously published results. Finally, we use the double-pass WO simulation to investigate the double-pass channel in the MRR FSO systems. The histograms of the turbulence-induced fading in the forward and backward channels are obtained from the simulation data and are fitted by gamma-gamma (ΓΓ) distributions. As the two opposite channels are highly correlated, we model the double-pass channel fading by the product of two correlated

  4. Grading nuclear, cortical and posterior subcapsular cataracts using an objective scatter index measured with a double-pass system.

    Vilaseca, Meritxell; Romero, Maria José; Arjona, Montserrat; Luque, Sergio Oscar; Ondategui, Juan Carlos; Salvador, Antoni; Güell, José L; Artal, Pablo; Pujol, Jaume

    2012-09-01

    To evaluate objectively intraocular scattering in eyes with nuclear, cortical and posterior subcapsular cataracts by means of an objective scatter index (OSI) obtained from double-pass images. To compare the results with those obtained using clinical conventional procedures. In this prospective, observational, cross-sectional, non-consecutive case series study, 188 eyes with cataracts of 136 patients were analysed (123 eyes had nuclear, 41 eyes had cortical and 24 eyes had posterior subcapsular cataracts). The control group consisted of 117 eyes of 68 healthy patients. Patient examination included subjective refraction, best spectacle-corrected visual acuity (BSCVA), cataract grade using the lens opacities classification system III (LOCS III) and OSI. We found a decrease in the BSCVA and an increase in the OSI with increasing cataract grade. Statistically significant differences were observed when the OSI of eyes without cataracts and those with different LOCS III were compared. The comparison between the OSI and LOCS III reported good percentages of agreement regarding the number of eyes classified in equivalent levels: 72.4% (nuclear cataracts), 86.6% (cortical cataracts) and 84.3% (posterior subcapsular cataracts). A non-linear regression model was applied between OSI and BSCVA, which resulted in the following multiple correlation coefficients: r=0.878 (nuclear), r=0.843 (cortical) and r=0.844 (posterior subcapsular). The results of the study showed that OSI is a useful parameter for evaluating large amounts of intraocular scattering that can be used, in combination with other conventional procedures, as a valuable tool in clinical practice to grade cataracts objectively.

  5. Analysis and Verification of Message Sequence Charts of Distributed Systems with the Help of Coloured Petri Nets

    S. A. Chernenok

    2014-01-01

    Full Text Available The standard language of message sequence charts MSC is intended to describe scenarios of object interaction. Due to their expressiveness and simplicity MSC diagrams are widely used in practice at all stages of system design and development. In particular, the MSC language is used for describing communication behavior in distributed systems and communication protocols. In this paper the method for analysis and verification of MSC and HMSC diagrams is considered. The method is based on the translation of (HMSC into coloured Petri nets. The translation algorithms cover most standard elements of the MSC including data concepts. Size estimates of the CPN which is the result of the translation are given. Properties of the resulting CPN are analyzed and verified by using the known system CPN Tools and the CPN verifier based on the known tool SPIN. The translation method has been demonstrated by the example.

  6. Designing for scale: optimising the health information system architecture for mobile maternal health messaging in South Africa (MomConnect).

    Seebregts, Christopher; Dane, Pierre; Parsons, Annie Neo; Fogwill, Thomas; Rogers, Debbie; Bekker, Marcha; Shaw, Vincent; Barron, Peter

    2018-01-01

    MomConnect is a national initiative coordinated by the South African National Department of Health that sends text-based mobile phone messages free of charge to pregnant women who voluntarily register at any public healthcare facility in South Africa. We describe the system design and architecture of the MomConnect technical platform, planned as a nationally scalable and extensible initiative. It uses a health information exchange that can connect any standards-compliant electronic front-end application to any standards-compliant electronic back-end database. The implementation of the MomConnect technical platform, in turn, is a national reference application for electronic interoperability in line with the South African National Health Normative Standards Framework. The use of open content and messaging standards enables the architecture to include any application adhering to the selected standards. Its national implementation at scale demonstrates both the use of this technology and a key objective of global health information systems, which is to achieve implementation scale. The system's limited clinical information, initially, allowed the architecture to focus on the base standards and profiles for interoperability in a resource-constrained environment with limited connectivity and infrastructural capacity. Maintenance of the system requires mobilisation of national resources. Future work aims to use the standard interfaces to include data from additional applications as well as to extend and interface the framework with other public health information systems in South Africa. The development of this platform has also shown the benefits of interoperability at both an organisational and technical level in South Africa.

  7. A Visualized Message Interface (VMI) for intelligent messaging services

    Endo, T.; Kasahara, H.; Nakagawa, T.

    1984-01-01

    In CCITT, Message Handling Systems (MHS) have been studied from the viewpoint of communications protocol standardization. In addition to MHS services, Message Processing (MP) services, such as image processing, filing and retrieving services, will come into increasing demand in office automation field. These messaging services, including MHS services, can be thought of as Intelligent Messaging (IM) services. IM services include many basic services, optional user facilities and service parameters. Accordingly, it is necessary to deal with these parameters and MP procedures in as systematic and user-friendly a manner as possible. As one step towards realizing a user-friendly IM services interface, the characteristics of IM service parameters are studied and a Visualized Message Interface (VMI) which resembles a conventional letter exchange format is presented. The concept of VMI formation is discussed using the generic document structure concept as well as a Screen Interface and Protocol Interface conversion package

  8. Discrete geometric analysis of message passing algorithm on graphs

    Watanabe, Yusuke

    2010-04-01

    We often encounter probability distributions given as unnormalized products of non-negative functions. The factorization structures are represented by hypergraphs called factor graphs. Such distributions appear in various fields, including statistics, artificial intelligence, statistical physics, error correcting codes, etc. Given such a distribution, computations of marginal distributions and the normalization constant are often required. However, they are computationally intractable because of their computational costs. One successful approximation method is Loopy Belief Propagation (LBP) algorithm. The focus of this thesis is an analysis of the LBP algorithm. If the factor graph is a tree, i.e. having no cycle, the algorithm gives the exact quantities. If the factor graph has cycles, however, the LBP algorithm does not give exact results and possibly exhibits oscillatory and non-convergent behaviors. The thematic question of this thesis is "How the behaviors of the LBP algorithm are affected by the discrete geometry of the factor graph?" The primary contribution of this thesis is the discovery of a formula that establishes the relation between the LBP, the Bethe free energy and the graph zeta function. This formula provides new techniques for analysis of the LBP algorithm, connecting properties of the graph and of the LBP and the Bethe free energy. We demonstrate applications of the techniques to several problems including (non) convexity of the Bethe free energy, the uniqueness and stability of the LBP fixed point. We also discuss the loop series initiated by Chertkov and Chernyak. The loop series is a subgraph expansion of the normalization constant, or partition function, and reflects the graph geometry. We investigate theoretical natures of the series. Moreover, we show a partial connection between the loop series and the graph zeta function.

  9. Chaos-pass filtering in injection-locked semiconductor lasers

    Murakami, Atsushi; Shore, K. Alan

    2005-01-01

    Chaos-pass filtering (CPF) of semiconductor lasers has been studied theoretically. CPF is a phenomenon which occurs in laser chaos synchronization by injection locking and is a fundamental technique for the extraction of messages at the receiver laser in chaotic communications systems. We employ a simple theory based on driven damped oscillators to clarify the physical background of CPF. The receiver laser is optically driven by injection from the transmitter laser. We have numerically investigated the response characteristics of the receiver when it is driven by periodic (message) and chaotic (carrier) signals. It is thereby revealed that the response of the receiver laser in the two cases is quite different. For the periodic drive, the receiver exhibits a response depending on the signal frequency, while the chaotic drive provides a frequency-independent synchronous response to the receiver laser. We verify that the periodic and chaotic drives occur independently in the CPF response, and, consequently, CPF can be clearly understood in the difference of the two drives. Message extraction using CPF is also examined, and the validity of our theoretical explanation for the physical mechanism underlying CPF is thus verified

  10. Use of multimedia messaging system (MMS) by junior doctors for scan image transmission in neurosurgery.

    Ling, Ji Min; Lim, Kim Zhuan; Ng, Wai Hoe

    2012-02-01

    Multimedia Messaging Service (MMS) is used by neurosurgical residents to transmit scan images to the attending neurosurgeon in conjunction with telephone consultation. This service has been well received by the attending neurosurgeons, who felt that after viewing scan images on their phones, they felt increased confidence in clinical decision making and that it reduced the need for recall to the hospital. The use of MMS can be extended to junior doctors making referrals from regional hospitals with no neurosurgical cover. This study aims to validate the competency of non-neurosurgically trained junior doctors in selecting optimal images to transmit via MMS to the attending neurosurgeon on call. Ten junior doctors with no formal neurosurgical training and five neurosurgical residents were interviewed. They were shown the full complement of images together with relevant clinical history and assessment. They were then asked to make the radiological diagnosis and then select two images for MMS transmission to the attending neurosurgeon that they thought would best aid the neurosurgeon in clinical decision making. The attending neurosurgeon was asked to comment, on each image, whether his management plan would differ if he was shown the entire series of the images. All the images chosen are deemed appropriate, and the decision made based on the MMS images would be similar if the entire series of images were available to the neurosurgeon. However, 7 of 10 junior doctors were unable to read magnetic resonance images of lumbar spine. There was no significant difference in the images chosen by the neurosurgical residents and the junior doctors. It is feasible and safe for junior doctors to utilize MMS to transmit computed tomographic images to a neurosurgeon while making an urgent referral. The images selected are representative of the disease pathology and facilitate clinical decision making. Copyright © 2012 Elsevier Inc. All rights reserved.

  11. PRENACEL - a mHealth messaging system to complement antenatal care: a cluster randomized trial.

    Oliveira-Ciabati, Lívia; Vieira, Carolina Sales; Franzon, Ana Carolina Arruda; Alves, Domingos; Zaratini, Fabiani Spessoto; Braga, Giordana Campos; Sanchez, Jazmin Andrea Cifuentes; Bonifácio, Lívia Pimenta; Andrade, Magna Santos; Fernandes, Mariana; Quintana, Silvana Maria; Fabio, Suzi Volpato; Pileggi, Vicky Nogueira; Vieira, Elisabeth Meloni; Souza, João Paulo

    2017-11-07

    The aim of this study was to determine whether PRENACEL (a bi-directional, mobile-phone based, short text message service (SMS)) increases the coverage of recommended antenatal care (ANC) practices. A parallel, cluster-randomized trial in which 20 public primary Health Care Units (PHCUs) were randomly allocated to the intervention (10 PHCUs) or control (10 PHCUs) group. The study population included pregnant women aged 18 or above with a gestational age of 20 weeks or less. Pregnant women receiving ANC in intervention PHCUs were invited through leaflets and posters to register in PRENACEL. Women who registered in PRENACEL received a weekly set of short text messages with health education and health promotion content related to pregnancy and childbirth and were also able to clarify ANC queries through SMS. All women received routine ANC. The primary outcome was the proportion of women with high ANC Score, a composite measure of coverage of recommended ANC practices. Chi-square or Fisher's exact tests and multivariate log-binomial regression were used to analyze the outcomes. A total of 1210 eligible women received ANC in the participating PHCUs and took part of this study (770 in the intervention group and 440 in the control group). 20.4% (157/770) of intervention-group women registered in PRENACEL, but only 116 read all messages (73.9% of women who registered in PRENACEL, 116/157). The adjusted intention-to-treat analysis suggested no difference between intervention and control groups in the primary outcome (Adjusted Relative Risk (AdjRR): 1.05 (95% Confidence Interval (CI): 1.00-1.09). Both crude and adjusted per-protocol analysis suggested a positive effect of PRENACEL (Crude RR (95% CI): 1.14 (1.06-1.22), AdjRR (95% CI): 1.12 (1.05-1.21). The multivariate analysis also suggests that the PRENACEL group (women who read all SMS) had higher mean ANC score [48.5 (±4.2) vs 45.2 (±8.7), p celular, aumenta a cobertura das práticas recomendadas de cuidados pr

  12. Mixed messages

    Chen, Christopher B.; Hall, Kevin; Tsuyuki, Ross T.

    2014-01-01

    Background: More than 5 years ago, the Blueprint for Pharmacy developed a plan for transitioning pharmacy practice toward more patient-centred care. Much of the strategy for change involves communicating the new vision. Objective: To evaluate the communication of the Vision for Pharmacy by the organizations and corporations that signed the Blueprint for Pharmacy’s Commitment to Act. Methods: The list of 88 signatories of the Commitment to Act was obtained from the Blueprint for Pharmacy document. The website of each of these signatories was searched for all references to the Blueprint for Pharmacy or Vision for Pharmacy. Each of the identified references was then analyzed using summative content analysis. Results: A total of 934 references were identified from the webpages of the 88 signatories. Of these references, 549 were merely links to the Blueprint for Pharmacy’s website, 350 of the references provided some detailed information about the Blueprint for Pharmacy and only 35 references provided any specific plans to transition pharmacy practice. Conclusion: Widespread proliferation of the Vision for Pharmacy has not been achieved. One possible explanation for this is that communication of the vision by the signatories has been incomplete. To ensure the success of future communications, change leaders must develop strategies that consider how individual pharmacists and pharmacies understand the message. PMID:24660012

  13. Management and Archiving e-mail Messages in Governmental Organization

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  14. TPG bus passes

    Staff Association

    2013-01-01

    The CERN Staff Association will stop selling TPG bus passes. All active and retired members of the CERN personnel will be able to purchase Unireso bus passes from the CERN Hostel - Building 39 (Meyrin site) from 1st February 2013. For more information: https://cds.cern.ch/journal/CERNBulletin/2013/04/Announcements/1505279?ln=en

  15. Multi-Modal Intelligent Traffic Signal Systems (MMITSS) Basic Safety Message

    Department of Transportation — Data were collected during the Multi-Modal Intelligent Transportation Signal Systems (MMITSS) study. MMITSS is a next-generation traffic signal system that seeks to...

  16. A 1microW 85nV/ radicalHz pseudo open-loop preamplifier with programmable band-pass filter for neural interface system.

    Chang, Sun-Il; Yoon, Euisik

    2009-01-01

    We report an energy efficient pseudo open-loop amplifier with programmable band-pass filter developed for neural interface systems. The proposed amplifier consumes 400nA at 2.5V power supply. The measured thermal noise level is 85nV/ radicalHz and input-referred noise is 1.69microV(rms) from 0.3Hz to 1 kHz. The amplifier has a noise efficiency factor of 2.43, the lowest in the differential topologies reported up to date to our knowledge. By programming the switched-capacitor frequency and bias current, we could control the bandwidth of the preamplifier from 138 mHz to 2.2 kHz to meet various application requirements. The entire preamplifier including band-pass filters has been realized in a small area of 0.043mm(2) using a 0.25microm CMOS technology.

  17. Passing and Catching in Rugby.

    Namudu, Mike M.

    This booklet contains the fundamentals for rugby at the primary school level. It deals primarily with passing and catching the ball. It contains instructions on (1) holding the ball for passing, (2) passing the ball to the left--standing, (3) passing the ball to the left--running, (4) making a switch pass, (5) the scrum half's normal pass, (6) the…

  18. Nonblocking and orphan free message logging protocols

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  19. Military Message Experiment. Volume II.

    1982-04-01

    elements of the Department of Defense. This resulted in a memorandum from the Director, Telecomunications and Comand and Control, OSD, in June 1975...1978 to April 1979 and provides a discussion of the telecomunications inter- face aspects of the experiment. This Final Report covers the period of...arise in the telecomunication system which require A retransmission of an outgoing message. A "service" message may be created within the

  20. [The systemic approach to the rehabilitation of the patients presenting with laryngeal cancer after the resection of the organ and laryngectomy with tracheoesophageal by-pass and endoprosthetics].

    Kryukov, A I; Reshetov, I V; Kozhanov, L G; Sdvizhkov, A M; Kozhanov, A L

    The objective of the present study was to enhance the effectiveness of rehabilitation of the patients presenting with laryngeal cancer after the resection of the organ and laryngotomy with tracheoesophageal by-pass and endoprosthetics. Our experience in this field is based on the treatment of 102 patients. They were distributed by the nosological forms as follows: primary laryngeal cancer in 97 patients including T1NoMo - 8 (8.2%), T2NoMo - 63 (65%), T3NoMo - 18 (17.6%), T2N1Mo - 1 (0.9%), T4NoMo - 3 (2.9%), and T4N1M0 - 4 (3.9%), root of the tongue cancer spreading over the vestibular part of the larynx in one patient, laryngeal sarcoma in one patient, relapse of cancer following the full-dose radiotherapy and organ-sparing surgery in 3 patients. Laryngeal resection was performed in 83 patients; 19 patients underwent laryngectomy with tracheoesophageal by-pass and endoprosthetics using a domestically manufactured voice prosthesis. The systemic approach to the rehabilitation of the patients and the use of the proposed treatment algorithm made it possible to restore the function of the larynx by means of organ-sparing surgery in 79 (95.1%) of the 83 patients. The vocal function in the patients following laryngectomy with tracheoesophageal by-pass and endoprosthetics was restored in 18 (94.7%) of the 19 patients.

  1. Avoiding Message-Dependent Deadlock in Network-Based Systems on Chip

    Hansson, A.; Goossens, K.; Rãdulescu, A.

    2007-01-01

    Networks on chip (NoCs) are an essential component of systems on chip (SoCs) and much research is devoted to deadlock avoidance in NoCs. Prior work focuses on the router network while protocol interactions between NoC and intellectual property (IP) modules are not considered. These interactions

  2. Redesign of emergency water supply system by-pass line from Cernavoda NPP Unit 1 and 2 using self regulating valves

    Tenescu, Mircea; Bigu, Melania; Nita, Iulian Pavel

    2010-01-01

    In this paper one considered improving the EWS (emergency water supply system) by-pass line in order to replace current manual operated valve with an self operated valve. This change is necessary in order to reduce the human error events in operation of the system in case of a DBE (design basis earthquake). The paper describes a theoretical and practical operation of a system using self regulating flow rate valves. Basically, the elimination of a possible human error in operating a system is important for nuclear safety in case of a DBE because it makes it avoidable in normal reactor cooling systems. The paper describes checking of the functioning of this equipment in operating conditions, investigating how it responds to various operating regimes. (authors)

  3. Architecture for WSN Nodes Integration in Context Aware Systems Using Semantic Messages

    Larizgoitia, Iker; Muguira, Leire; Vazquez, Juan Ignacio

    Wireless sensor networks (WSN) are becoming extremely popular in the development of context aware systems. Traditionally WSN have been focused on capturing data, which was later analyzed and interpreted in a server with more computational power. In this kind of scenario the problem of representing the sensor information needs to be addressed. Every node in the network might have different sensors attached; therefore their correspondent packet structures will be different. The server has to be aware of the meaning of every single structure and data in order to be able to interpret them. Multiple sensors, multiple nodes, multiple packet structures (and not following a standard format) is neither scalable nor interoperable. Context aware systems have solved this problem with the use of semantic technologies. They provide a common framework to achieve a standard definition of any domain. Nevertheless, these representations are computationally expensive, so a WSN cannot afford them. The work presented in this paper tries to bridge the gap between the sensor information and its semantic representation, by defining a simple architecture that enables the definition of this information natively in a semantic way, achieving the integration of the semantic information in the network packets. This will have several benefits, the most important being the possibility of promoting every WSN node to a real semantic information source.

  4. Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm

    Rachmawati, D.; Budiman, M. A.; Aulya, L.

    2018-02-01

    Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.

  5. The impact of flavour, device type and warning messages on youth preferences for electronic nicotine delivery systems: evidence from an online discrete choice experiment.

    Shang, Ce; Huang, Jidong; Chaloupka, Frank J; Emery, Sherry L

    2017-11-02

    To examine the impact of flavour, device type and health warning messages on youth preference for electronic nicotine delivery systems (ENDS), and to provide evidence and data to inform the Food and Drug Administration's potential regulatory actions on ENDS. An online discrete choice experiment was conducted in September 2015. Each participant was given nine choice sets and asked to choose one out of two alternative ENDS products, with varying characteristics in three attributes (flavour, device type and warning message). The impact of the attributes on the probability of choosing ENDS was analysed using conditional and nested logit regressions, controlling for individual sociodemographic characteristics and current smoking status. A general population sample of 515 participants (50 ever-users and 465 never-users of ENDS) aged 14-17 years were recruited to complete the experiment using an online panel. Fruit/sweets/beverage flavours significantly increase the probability of choosing ENDS among youth (pe-cigarettes, increase (p<0.05) the probability of choosing ENDS among adolescent never-users. Warning messages reduce (p<0.01) the probability of choosing ENDS among never-users. Restricting fruit/sweets/beverage flavours in ENDS, regulating modifiable vaping devices and adopting strong health warning messages may reduce the uptake of ENDS among youth. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  6. Message survival and decision dynamics in a class of reactive complex systems subject to external fields

    Rodriguez Lucatero, C.; Schaum, A.; Alarcon Ramos, L.; Bernal-Jaquez, R.

    2014-07-01

    In this study, the dynamics of decisions in complex networks subject to external fields are studied within a Markov process framework using nonlinear dynamical systems theory. A mathematical discrete-time model is derived using a set of basic assumptions regarding the convincement mechanisms associated with two competing opinions. The model is analyzed with respect to the multiplicity of critical points and the stability of extinction states. Sufficient conditions for extinction are derived in terms of the convincement probabilities and the maximum eigenvalues of the associated connectivity matrices. The influences of exogenous (e.g., mass media-based) effects on decision behavior are analyzed qualitatively. The current analysis predicts: (i) the presence of fixed-point multiplicity (with a maximum number of four different fixed points), multi-stability, and sensitivity with respect to the process parameters; and (ii) the bounded but significant impact of exogenous perturbations on the decision behavior. These predictions were verified using a set of numerical simulations based on a scale-free network topology.

  7. Prospect: A Picture Exchange Communication System (PECS)-based Instant Messaging Application for Autism Spectrum Condition

    Raja, Pravind; Zainuri Saringat, Mohd; Mustapha, Aida; Zainal, Abidah

    2017-08-01

    Autism Spectrum Disorder (ASC) has widely gained the common attention from the public especially autistic communities. Individuals with ASC are said to have poor verbal skills and this affects them in carrying out their daily basis which they are afraid to expose themselves to the world due to their problems. ASC is diagnosed among children ranging from ages 5-12 years old and they suffer from the abnormal functioning of the brain which in turn causes lack of development activities. Thus, studies have shown that diagrammatic approaches help children with ASC to overcome their issues and improvise their visual and verbal skills. Picture Exchange Communication System or PECS consists of a series of illustrated cards and each cards has its own illustration with a caption on it. These children will understand the cards and they can compile several other cards to form sentences. This paper presents a mobile application called the Prospect, which has been developed using the agile development model for digital representation of PECS. The application is hoped to enhance the learning process and a better yielding results.

  8. The Child Protection System from the Perspective of Young People: Messages from 3 Studies

    Carme Montserrat

    2014-10-01

    Full Text Available This article reports findings and reflections based on the results of three different research projects conducted between 2008 and 2013 and focusing on the perspective of young care leavers in Spain. The overall aim was to examine these young people’s perceptions and evaluations of how they were treated while in the public care system, mainly residential care. Reviewing these qualitative studies, the most common and relevant issues highlighted by young people were related to the following themes: (a entering care; (b stability and emotional bonds in care; (c education; (d friends; (e labelling, stigmatization, rights and opportunities; (f autonomy and responsibility versus overprotection; (g contact with parents, siblings and extended family; (h maltreatment in care; and (i leaving care. One of the main elements used in their assessments was comparison (i between their previous situation within their birth family and the quality of care experienced in the residential home; and (ii between what these young people commonly refer to as “normal children” and children in care. Recommendations deriving from their advice and opinions are also debated.

  9. North Texas Sediment Budget: Sabine Pass to San Luis Pass

    2006-09-01

    concrete units have been placed over sand-filled fabric tube . .......................................33 Figure 28. Sand-filled fabric tubes protecting...system UTM Zone 15, NAD 83 Longshore drift directions King (in preparation) Based on wave hindcast statistics and limited buoy data Rollover Pass...along with descriptions of the jetties and limited geographic coordinate data1 (Figure 18). The original velum or Mylar sheets from which the report

  10. EMI Messaging Guidelines

    Cons, L.

    2011-01-01

    Guidelines for potential users of messaging within EMI. The goal is to provide enough practical information so that EMI product teams can start investigating whether using messaging in their products can be beneficial or not.

  11. A Unified Algorithm for Channel Imbalance and Antenna Phase Center Position Calibration of a Single-Pass Multi-Baseline TomoSAR System

    Yuncheng Bu

    2018-03-01

    Full Text Available The multi-baseline synthetic aperture radar (SAR tomography (TomoSAR system is employed in such applications as disaster remote sensing, urban 3-D reconstruction, and forest carbon storage estimation. This is because of its 3-D imaging capability in a single-pass platform. However, a high 3-D resolution of TomoSAR is based on the premise that the channel imbalance and antenna phase center (APC position are precisely known. If this is not the case, the 3-D resolution performance will be seriously degraded. In this paper, a unified algorithm for channel imbalance and APC position calibration of a single-pass multi-baseline TomoSAR system is proposed. Based on the maximum likelihood method, as well as the least squares and the damped Newton method, we can calibrate the channel imbalance and APC position. The algorithm is suitable for near-field conditions, and no phase unwrapping operation is required. The effectiveness of the proposed algorithm has been verified by simulation and experimental results.

  12. CHAIRMAN'S WELCOME MESSAGE Chairman's message

    Oldham, Mark

    2010-11-01

    Every clinical physicist I have asked readily acknowledges the great desirability of a 3D dosimetry system for the verification of advanced radiation therapy treatments. An accurate and practical 3D dosimetry system would greatly strengthen the foundation of quality assurance in radiation therapy by enabling a rigorous and comprehensive whole system test. Such systems are now emerging, and the innovations and progress that led to them are remarkably captured in the proceedings of five prior DOSGEL conferences, the last three of which are freely available in the Journal of Physics: Conference Series. These meetings included a focus on the technical challenges of various approaches to 3D dosimetry. When considering plans for the present 6th meeting, the scientific committee recognized that the field has matured, and a broader focus was desirable, including a strengthening of the clinical and applications component, while preserving a strong technical component. There was also the desire to embrace a variety of other semi-3D techniques which have also recently emerged to implementation in the clinic. In accordance with these sentiments, the committee approved changing the name of the conference from the International Conference on Radiotherapy Gel Dosimetry (DOSGEL) to the International Conference on 3D Radiation Dosimetry (IC3DDose) and to the following objectives - Conference Objectives: 1. To provide a forum to discuss the latest research and developments in 3D and advanced radiation dosimetry. 2. To elevate the quality of radiation therapy treatments (quality assurance QA) through improved clinical dosimetry. 3. To explore the dosimetric challenges posed by modern radiation treatment techniques 4. To energize and diversify dosimetry research and clinical practice by encouraging interaction and synergy between advanced, 3D, and semi-3D dosimetry techniques The scientific program of the IC3DDose2010 meeting has been crafted to meet the objectives listed above, and

  13. Designing for scale: optimising the health information system architecture for mobile maternal health messaging in South Africa (MomConnect)

    Seebregts, C

    2018-04-01

    Full Text Available MomConnect is a national initiative coordinated by the South African National Department of Health that sends text-based mobile phone messages free of charge to pregnant women who voluntarily register at any public healthcare facility in South...

  14. Performance of high-temperature superconducting band-pass filters with high selectivity for base transceiver applications of digital cellular communication systems

    Kwak, J. S.; Lee, J. H.; Kim, C. O.; Hong, J. P.; Han, S. K.; Char, K.

    2002-07-01

    Highly selective high-temperature superconducting band-pass filters based on spiral meander line structures have been developed for base transceiver station applications of digital cellular communication systems. The filter comprised 12-pole microstrip line resonators with a circuit size of 0.5 × 17 × 41 mm3. The filter was designed to have a bandwidth of 25 MHz at a centre frequency of 834 MHz. Particularly, the physical size of each resonator was chosen not only to reduce far-field radiation, but also to have reasonable tunability in the filter. Device characteristics exhibited a low insertion loss of 0.4 dB with a 0.2 dB ripple and a return loss better than 10 dB in the pass-band at 65 K. The out-of-band signals were attenuated better than 60 dB at about 3.5 MHz from the lower band edge, and 3.8 MHz from the higher band edge.

  15. Performance of high-temperature superconducting band-pass filters with high selectivity for base transceiver applications of digital cellular communication systems

    Kwak, J.S.; Lee, J.H.; Kim, C.O.; Hong, J.P. [Department of Physics, Hanyang University, Seoul (Korea, Republic of); Han, S.K.; Char, K. [RFtron Inc., Seoul (Korea, Republic of)

    2002-07-01

    Highly selective high-temperature superconducting band-pass filters based on spiral meander line structures have been developed for base transceiver station applications of digital cellular communication systems. The filter comprised 12-pole microstrip line resonators with a circuit size of 0.5x17x41 mm{sup 3}. The filter was designed to have a bandwidth of 25 MHz at a centre frequency of 834 MHz. Particularly, the physical size of each resonator was chosen not only to reduce far-field radiation, but also to have reasonable tunability in the filter. Device characteristics exhibited a low insertion loss of 0.4 dB with a 0.2 dB ripple and a return loss better than 10 dB in the pass-band at 65 K. The out-of-band signals were attenuated better than 60 dB at about 3.5 MHz from the lower band edge, and 3.8 MHz from the higher band edge. (author)

  16. Performance of high-temperature superconducting band-pass filters with high selectivity for base transceiver applications of digital cellular communication systems

    Kwak, J.S.; Lee, J.H.; Kim, C.O.; Hong, J.P.; Han, S.K.; Char, K.

    2002-01-01

    Highly selective high-temperature superconducting band-pass filters based on spiral meander line structures have been developed for base transceiver station applications of digital cellular communication systems. The filter comprised 12-pole microstrip line resonators with a circuit size of 0.5x17x41 mm 3 . The filter was designed to have a bandwidth of 25 MHz at a centre frequency of 834 MHz. Particularly, the physical size of each resonator was chosen not only to reduce far-field radiation, but also to have reasonable tunability in the filter. Device characteristics exhibited a low insertion loss of 0.4 dB with a 0.2 dB ripple and a return loss better than 10 dB in the pass-band at 65 K. The out-of-band signals were attenuated better than 60 dB at about 3.5 MHz from the lower band edge, and 3.8 MHz from the higher band edge. (author)

  17. Diabetes education via mobile text messaging.

    Wangberg, Silje C; Arsand, Eirik; Andersson, Niklas

    2006-01-01

    Living with diabetes makes great educational demands on a family. We have tested the feasibility of using the mobile phone short message service (SMS) for reaching people with diabetes information. We also assessed user satisfaction and perceived pros and cons of the medium through interviews. Eleven parents of children with type 1 diabetes received messages for 11 weeks. The parents were positive about the system and said that they would like to continue to use it. The pop-up reminding effect of SMS messages in busy everyday life was noted as positive. Some parents experienced the messages as somewhat intrusive, arriving too often and at inconvenient times. The parents also noted the potential of the messages to facilitate communication with their adolescent children. The inability to store all of the messages or to print them out were seen as major disadvantages. Overall, the SMS seems to hold promise as means of delivering diabetes information.

  18. Extracting messages masked by chaos

    Perez, G.; Cerdeira, H.A.

    1995-01-01

    We show how to extract messages that are masked by a chaotic signal in a system of two Lorenz oscillators. This mask removal is done for two different modes of transmission, a digital one where a parameter of the sender is switched between two values, and an analog mode, where a small amplitude message is added to the carrier signal. We achieve this without using a second Lorenz oscillator as receiver, and without doing a full reconstruction of the dynamics. This method is robust with respect to transformations that impede the unmasking using a Lorenz receiver, and is not affected by the broad-band noise that is inherent to the synchronization process. We also discuss the limitations of this way of extraction for messages in high frequency bands. (author). 12 refs, 4 figs

  19. PUMA: An Operating System for Massively Parallel Systems

    Stephen R. Wheat

    1994-01-01

    Full Text Available This article presents an overview of PUMA (Performance-oriented, User-managed Messaging Architecture, a message-passing kernel for massively parallel systems. Message passing in PUMA is based on portals – an opening in the address space of an application process. Once an application process has established a portal, other processes can write values into the portal using a simple send operation. Because messages are written directly into the address space of the receiving process, there is no need to buffer messages in the PUMA kernel and later copy them into the applications address space. PUMA consists of two components: the quintessential kernel (Q-Kernel and the process control thread (PCT. Although the PCT provides management decisions, the Q-Kernel controls access and implements the policies specified by the PCT.

  20. Effectiveness of vehicle weight enforcement in a developing country using weigh-in-motion sorting system considering vehicle by-pass and enforcement capability

    Mohamed Rehan Karim

    2014-03-01

    Full Text Available Vehicle overloading has been identified as one of the major contributors to road pavement damage in Malaysia. In this study, the weigh-in-motion (WIM system has been used to function as a vehicle weight sorting tool to complement the exsiting static weigh bridge enforcement station. Data collected from the developed system is used to explore the effectiveness of using WIM system in terms of generating more accurate data for enforcement purposes and at the same time improving safety and reducing the number of vehicle weight violations on the roads. This study specifically focus on the effect of vehicle by-pass and static weigh station enforcement capability on the overall effectiveness of vehicle weight enforcement system in a developing country. Results from this study suggest that the WIM system will significantly enhance the effectiveness and efficiency of the current vehicle weight enforcement, thus generating substantial revenue that would greatly off-set the current road maintenance budget that comes from tax payers money. If there is substantial reduction in overloaded vehicles, the public will still gain through reduction in road maintenance budget, less accident risks involving heavy trucks, and lesser greenhouse gases (GHGs emissions.

  1. Introduction: Mirrors of Passing

    Seebach, Sophie Hooge; Willerslev, Rane

    How is death, time, and materiality interconnected? How to approach an understanding of the world of the dead? In this introduction, we seek to understand how the experience of material decay, of the death of those around us, makes us aware of the passing of time. Through the literary lens of Neil...... Gaiman’s The Graveyard Book, we explore how the world of the dead and the world of the living can intersect; how time and materiality shifts and changes depending on who experiences it. These revelations, based on fiction, provide a mirror through which the reader can experience the varied chapters...

  2. Unified Internet Messaging

    Healy, Paul; Barber, Declan

    2015-01-01

    As telephony services, mobile services and internet services continue to converge, the prospect of providing Unified Messaging and even Unified Communications becomes increasingly achievable. This paper discusses the growing importance of IP-based networks to Unified Messaging developments and examines some of the key services and protocols that are likely to make Unified Messaging more widely available. In this initial paper, we limit ourselves initially to the unification of text-based mess...

  3. Passing the baton

    2011-01-01

    It was not only in South Korea that batons were being passed last week. While the cream of the world’s athletes were competing in the World Athletics Championships, the cream of the world’s accelerator scientists were on their way to San Sebastian in Spain for the International Particle Accelerator Conference.  One of them was carrying a rather special baton for a handover of a different kind.   When Fermilab’s Vladimir Shiltsev handed the high-energy frontier baton to CERN’s Mike Lamont on Tuesday, it marked the end of an era: a time to look back on the phenomenal contribution the Tevatron has made to particle physics over its 25-year operational lifetime, and the great contribution Fermilab has made over that period to global collaboration in particle physics. There’s always a lot of emotion involved in passing the baton. In athletics, it’s the triumph of wining or the heartbreak of losing. But for this special baton, the...

  4. TRT Barrel milestones passed

    Ogren, H

    2004-01-01

    The barrel TRT detector passed three significant milestones this spring. The Barrel Support Structure (BSS) was completed and moved to the SR-1 building on February 24th. On March 12th the first module passed the quality assurance testing in Building 154 and was transported to the assembly site in the SR-1 building for barrel assembly. Then on April 21st the final production module that had been scanned at Hampton University was shipped to CERN. TRT Barrel Module Production The production of the full complement of barrel modules (96 plus 9 total spares) is now complete. This has been a five-year effort by Duke University, Hampton University, and Indiana University. Actual construction of the modules in the United States was completed in the first part of 2004. The production crews at each of the sites in the United States have now completed their missions. They are shown in the following pictures. Duke University: Production crew with the final completed module. Indiana University: Module producti...

  5. The Physical Therapy and Society Summit (PASS) Meeting: observations and opportunities.

    Kigin, Colleen M; Rodgers, Mary M; Wolf, Steven L

    2010-11-01

    The construct of delivering high-quality and cost-effective health care is in flux, and the profession must strategically plan how to meet the needs of society. In 2006, the House of Delegates of the American Physical Therapy Association passed a motion to convene a summit on "how physical therapists can meet current, evolving, and future societal health care needs." The Physical Therapy and Society Summit (PASS) meeting on February 27-28, 2009, in Leesburg, Virginia, sent a clear message that for physical therapists to be effective and thrive in the health care environment of the future, a paradigm shift is required. During the PASS meeting, participants reframed our traditional focus on the physical therapist and the patient/client (consumer) to one in which physical therapists are an integral part of a collaborative, multidisciplinary health care team with the health care consumer as its focus. The PASS Steering Committee recognized that some of the opportunities that surfaced during the PASS meeting may be disruptive or may not be within the profession's present strategic or tactical plans. Thus, adopting a framework that helps to establish the need for change that is provocative and potentially disruptive to our present care delivery, yet prioritizes opportunities, is a critical and essential step. Each of us in the physical therapy profession must take on post-PASS roles and responsibilities to accomplish the systemic change that is so intimately intertwined with our destiny. This article offers a perspective of the dynamic dialogue and suggestions that emerged from the PASS event, providing further opportunities for discussion and action within our profession.

  6. Analysis of time resolution in a dual head LSO+PSPMT PET system using low pass filter interpolation and digital constant fraction discriminator techniques

    Monzo, Jose M.; Lerche, Christoph W.; Martinez, Jorge D.; Esteve, Raul; Toledo, Jose; Gadea, Rafael; Colom, Ricardo J.; Herrero, Vicente; Ferrando, Nestor; Aliaga, Ramon J.; Mateo, Fernando; Sanchez, Filomeno; Mora, Francisco J.; Benlloch, Jose M.; Sebastia, Angel

    2009-01-01

    PET systems need good time resolution to improve the true event rate, random event rejection, and pile-up rejection. In this study we propose a digital procedure for this task using a low pass filter interpolation plus a Digital Constant Fraction Discriminator (DCFD). We analyzed the best way to implement this algorithm on our dual head PET system and how varying the quality of the acquired signal and electronic noise analytically affects timing resolution. Our detector uses two continuous LSO crystals with a position sensitive PMT. Six signals per detector are acquired using an analog electronics front-end and these signals are processed using an in-house digital acquisition board. The test bench developed simulates the electronics and digital algorithms using Matlab. Results show that electronic noise and other undesired effects have a significant effect on the timing resolution of the system. Interpolated DCFD gives better results than non-interpolated DCFD. In high noise environments, differences are reduced. An optimum delay selection, based on the environment noise, improves time resolution.

  7. Analysis of time resolution in a dual head LSO+PSPMT PET system using low pass filter interpolation and digital constant fraction discriminator techniques

    Monzo, Jose M. [Digital Systems Design (DSD) Group, ITACA Institute, Universidad Politecnica de Valencia, Camino de Vera s/n, 46022 Valencia (Spain)], E-mail: jmonfer@aaa.upv.es; Lerche, Christoph W.; Martinez, Jorge D.; Esteve, Raul; Toledo, Jose; Gadea, Rafael; Colom, Ricardo J.; Herrero, Vicente; Ferrando, Nestor; Aliaga, Ramon J.; Mateo, Fernando [Digital Systems Design (DSD) Group, ITACA Institute, Universidad Politecnica de Valencia, Camino de Vera s/n, 46022 Valencia (Spain); Sanchez, Filomeno [Nuclear Medical Physics Group, IFIC Institute, Consejo Superior de Investigaciones Cientificas (CSIC), 46980 Paterna (Spain); Mora, Francisco J. [Digital Systems Design (DSD) Group, ITACA Institute, Universidad Politecnica de Valencia, Camino de Vera s/n, 46022 Valencia (Spain); Benlloch, Jose M. [Nuclear Medical Physics Group, IFIC Institute, Consejo Superior de Investigaciones Cientificas (CSIC), 46980 Paterna (Spain); Sebastia, Angel [Digital Systems Design (DSD) Group, ITACA Institute, Universidad Politecnica de Valencia, Camino de Vera s/n, 46022 Valencia (Spain)

    2009-06-01

    PET systems need good time resolution to improve the true event rate, random event rejection, and pile-up rejection. In this study we propose a digital procedure for this task using a low pass filter interpolation plus a Digital Constant Fraction Discriminator (DCFD). We analyzed the best way to implement this algorithm on our dual head PET system and how varying the quality of the acquired signal and electronic noise analytically affects timing resolution. Our detector uses two continuous LSO crystals with a position sensitive PMT. Six signals per detector are acquired using an analog electronics front-end and these signals are processed using an in-house digital acquisition board. The test bench developed simulates the electronics and digital algorithms using Matlab. Results show that electronic noise and other undesired effects have a significant effect on the timing resolution of the system. Interpolated DCFD gives better results than non-interpolated DCFD. In high noise environments, differences are reduced. An optimum delay selection, based on the environment noise, improves time resolution.

  8. Deuterium pass through target

    Alger, D.L.

    1975-01-01

    A neutron emitting target is described for use in neutron generating apparatus including a deuteron source and an accelerator vacuum chamber. The target consists of a tritium-containing target layer, a deuteron accumulation layer, and a target support containing passages providing communication between the accumulation layer and portions of the surface of the support exposed to the accelerator vacuum chamber. With this arrangement, deuterons passing through the target layer and implanting in and diffusing through the accumulation layer, diffuse into the communicating passages and are returned to the accelerator vacuum chamber. The invention allows the continuous removal of deuterons from the target in conventional water cooled neutron generating apparatus. Preferably, the target is provided with thin barrier layers to prevent undesirable tritium diffusion out of the target layer, as well as deuteron diffusion into the target layer

  9. Auctioning Bulk Mobile Messages

    S. Meij (Simon); L-F. Pau (Louis-François); H.W.G.M. van Heck (Eric)

    2003-01-01

    textabstractThe search for enablers of continued growth of SMS traffic, as well as the take-off of the more diversified MMS message contents, open up for enterprises the potential of bulk use of mobile messaging , instead of essentially one-by-one use. In parallel, such enterprises or value added

  10. The effect of short message system (SMS) reminder on adherence to a healthy diet, medication, and cessation of smoking among adult patients with cardiovascular diseases.

    Akhu-Zaheya, Laila M; Shiyab, Wa'ed Y

    2017-02-01

    Cardiovascular Disease is the leading cause of death worldwide. Non-adherence to a recommended regimen among patients with Cardiovascular Diseases represents a significant problem which could lead to an increase in Cardiovascular Diseases. This study aimed to assess the effects of Short Message System (SMS) reminders on adherence to a healthy diet, medication, and cessation of smoking among adult patients with Cardiovascular Diseases. Randomized controlled trial design with three groups was used for this study. A non-probability convenient sample of 160 patients was recruited in this study. The participants were assigned randomly to an experimental group (received SMS regarding adherence to a healthy diet, medication, and smoking cessation), placebo group (received general messages) and control group (routine care). Morisky 8-Item Medication Adherence Scale (MMAS), Mediterranean Diet Adherence Screener (MEDAS), and Readiness to Quit Ladder, were used to assess patients' adherence to medication, adherence to Mediterranean diet, and smoking cessation, respectively. The outcomes were assessed at the beginning of the study and three months later, following completion of the intervention. One way ANONVA was used to assess the study hypothesis. Significant differences between study groups found in terms of adherence to medication (p=.001) and adherence to a healthy diet (p=.000); however, no significant difference was found between groups, in terms of intention to quit smoking, and/or the number of cigarettes smoked (p= .327), (p=.34), respectively. It is documented that SMS is effective in improving adherence to a healthy diet and medication. SMS could be a promising solution for management of different chronic diseases. It is recommended to apply Short Message System (SMS) via cellphone services to improve patient's adherence to a healthy diet and medication. However, further research is needed to support the effectiveness of SMS. Copyright © 2016 Elsevier Ireland

  11. AMS: Area Message Service for SLC

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-04-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require and application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI 'C' and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  12. Project on Alternative Systems Study - PASS. Comparison of technology of KBS-3, MLH, VLH and VDH concepts by using an expert group

    Olsson, Lars; Sandstedt, H.

    1992-09-01

    This report constitutes a technical comparison and ranking of four repository concepts for final disposal of spent nuclear fuel, that have been studied by SKB: KBS-3, Medium Long Holes (MLH), Very Long Holes (VLH) and Very Deep Holes (VDH). The technical comparison is part of the project 'Project on Alternative Systems Study, PASS', which was initiated by SKB. With the objective of presenting a ranking of the four concepts. Besides this comparison of Technology the ranking is separately made for Long-term Performance and Safety, and Costs before the merging into one verdict. The ranking regarding Technology was carried out in accordance with the method Analytical Hierarchy Process, AHP, and by the aid of expert judgement in the form of a group consisting of six experts. The AHP method implies that the criteria for comparison are ordered in a hierarchy and that the ranking is carried out by pairwise comparison of the criteria. In the evaluation process a measure of the relative importance of each criterion is obtained. The result of the expert judgement exercise was that each expert individually ranked the four concepts in the following order with the top ranked alternative first: KBS-3, MLH, VLH and VDH. The common opinion among the experts was that the top ranking of KBS-3 is significant and the the major criteria used in the study could change substantially without changing the top ranking of KBS-3

  13. MORPHOLOGICAL STRATEGIES IN TEXT MESSAGING AMONG ...

    Text messaging is the application of abridged morphological forms in order ... the emergence of the Global System for Mobile Communication (GSM) in the world. ... Our thesis statement is that these morphological patterns as used in SMS are ...

  14. Engineered cell-cell communication via DNA messaging

    Ortiz Monica E

    2012-09-01

    Full Text Available Abstract Background Evolution has selected for organisms that benefit from genetically encoded cell-cell communication. Engineers have begun to repurpose elements of natural communication systems to realize programmed pattern formation and coordinate other population-level behaviors. However, existing engineered systems rely on system-specific small molecules to send molecular messages among cells. Thus, the information transmission capacity of current engineered biological communication systems is physically limited by specific biomolecules that are capable of sending only a single message, typically “regulate transcription.” Results We have engineered a cell-cell communication platform using bacteriophage M13 gene products to autonomously package and deliver heterologous DNA messages of varying lengths and encoded functions. We demonstrate the decoupling of messages from a common communication channel via the autonomous transmission of various arbitrary genetic messages. Further, we increase the range of engineered DNA messaging across semisolid media by linking message transmission or receipt to active cellular chemotaxis. Conclusions We demonstrate decoupling of a communication channel from message transmission within engineered biological systems via the autonomous targeted transduction of user-specified heterologous DNA messages. We also demonstrate that bacteriophage M13 particle production and message transduction occurs among chemotactic bacteria. We use chemotaxis to improve the range of DNA messaging, increasing both transmission distance and communication bit rates relative to existing small molecule-based communication systems. We postulate that integration of different engineered cell-cell communication platforms will allow for more complex spatial programming of dynamic cellular consortia.

  15. The Swedish Blood Pass project.

    Berglund, B; Ekblom, B; Ekblom, E; Berglund, L; Kallner, A; Reinebo, P; Lindeberg, S

    2007-06-01

    Manipulation of the blood's oxygen carrying capacity (CaO(2)) through reinfusion of red blood cells, injections of recombinant erythropoietin or by other means results in an increased maximal oxygen uptake and concomitantly enhanced endurance performance. Therefore, there is a need to establish a system--"A Blood Pass"--through which such illegal and unethical methods can be detected. Venous blood samples were taken under standardized conditions from 47 male and female Swedish national and international elite endurance athletes four times during the athletic year of the individual sport (beginning and end of the preparation period and at the beginning and during peak performance in the competition period). In these samples, different hematological values were determined. ON(hes) and OFF(hre) values were calculated according to the formula of Gore et al. A questionnaire regarding training at altitude, alcohol use and other important factors for hematological status was answered by the athletes. There were some individual variations comparing hematological values obtained at different times of the athletic year or at the same time in the athletic year but in different years. However, the median values of all individual hematological, ON(hes) and OFF(hre), values taken at the beginning and the end of the preparation or at the beginning and the end of the competition period, respectively, as well as median values for the preparation and competition periods in the respective sport, were all within the 95% confidence limit (CI) of each comparison. It must be mentioned that there was no gender difference in this respect. This study shows that even if there are some individual variations in different hematological values between different sampling times in the athletic year, median values of important hematological factors are stable over time. It must be emphasized that for each blood sample, the 95% CI in each athlete will be increasingly narrower. The conclusion is that

  16. Instant Messaging by SIP

    Muhi, Daniel; Dulai, Tibor; Jaskó, Szilárd

    2008-11-01

    SIP is a general-purpose application layer protocol which is able to establish sessions between two or more parties. These sessions are mainly telephone calls and multimedia conferences. However it can be used for other purposes like instant messaging and presence service. SIP has a very important role in mobile communication as more and more communicating applications are going mobile. In this paper we would like to show how SIP can be used for instant messaging purposes.

  17. The PASS project architectural model

    Day, C.T.; Loken, S.; Macfarlane, J.F.

    1994-01-01

    The PASS project has as its goal the implementation of solutions to the foreseen data access problems of the next generation of scientific experiments. The architectural model results from an evaluation of the operational and technical requirements and is described in terms of an abstract reference model, an implementation model and a discussion of some design aspects. The abstract reference model describes a system that matches the requirements in terms of its components and the mechanisms by which they communicate, but does not discuss policy or design issues that would be necessary to match the model to an actual implementation. Some of these issues are discussed, but more detailed design and simulation work will be necessary before choices can be made

  18. Ultrastructural evaluation of multiple pass low energy versus single pass high energy radio-frequency treatment.

    Kist, David; Burns, A Jay; Sanner, Roth; Counters, Jeff; Zelickson, Brian

    2006-02-01

    The radio-frequency (RF) device is a system capable of volumetric heating of the mid to deep dermis and selective heating of the fibrous septa strands and fascia layer. Clinically, these effects promote dermal collagen production, and tightening of these deep subcutaneous structures. A new technique of using multiple low energy passes has been described which results in lower patient discomfort and fewer side effects. This technique has also been anecdotally described as giving more reproducible and reliable clinical results of tissue tightening and contouring. This study will compare ultrastructural changes in collagen between a single pass high energy versus up to five passes of a multiple pass lower energy treatment. Three subjects were consented and treated in the preauricular region with the RF device using single or multiple passes (three or five) in the same 1.5 cm(2) treatment area with a slight delay between passes to allow tissue cooling. Biopsies from each treatment region and a control biopsy were taken immediately, 24 hours or 6 months post treatment for electron microscopic examination of the 0-1 mm and 1-2 mm levels. Sections of tissue 1 mm x 1 mm x 80 nm were examined with an RCA EMU-4 Transmission Electron Microscope. Twenty sections from 6 blocks from each 1 mm depth were examined by 2 blinded observers. The morphology and degree of collagen change in relation to area examined was compared to the control tissue, and estimated using a quantitative scale. Ultrastructural examination of tissue showed that an increased amount of collagen fibril changes with increasing passes at energies of 97 J (three passes) and 122 J (five passes), respectively. The changes seen after five multiple passes were similar to those detected after much more painful single pass high-energy treatments. This ultrastructural study shows changes in collagen fibril morphology with an increased effect demonstrated at greater depths of the skin with multiple low-fluence passes

  19. Asynchronous Message Service Reference Implementation

    Burleigh, Scott C.

    2011-01-01

    This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to

  20. PASS program status report

    Waddoups, I.G.; Burek, R.J.

    1991-01-01

    This paper reports that the Department of Energy, with direct support from Sandia National Laboratories, is developing new standards and systems for automated access control. The program, known as the Personnel Access-Control and Security-Enhancement System will be applied across the entire Department. The major goals are to afford increased protection for the Department's most valuable assets through use of compartmentalization and automated systems and meet certain minimum functional specifications, and to simplify handling of inter-site visit requests and approvals. Since the program's inception in 1988 accomplishments include development of minimum system requirements, specifications for a common badge and common data, a common biometric device, selection of early baseline hardware and software components for use in a testbed and demonstration system, and initiation of new installations and existing system modifications. These requirements have been issued with the most recent update to the Department's Safeguards and Security Standards and Criteria. Problems include agreement on standards between sites with widely varying characteristics, and integration of related health and safety procedures. A coalition of security people from the weapons laboratories met as a working group for a time to discuss and resolve some technical issues. More activity is needed in this area

  1. Couriers in the Inca Empire: Getting Your Message Across. [Lesson Plan].

    2002

    This lesson shows how the Inca communicated across the vast stretches of their mountain realm, the largest empire of the pre-industrial world. The lesson explains how couriers carried messages along mountain-ridge roads, up and down stone steps, and over chasm-spanning footbridges. It states that couriers could pass a message from Quito (Ecuador)…

  2. The message is the message-maker.

    Chalkley, A B

    1977-03-01

    For those engaged in family planning or other demographic work of an active kind, serious errors can be made and much money and skill wasted unless there is a clear idea of available means of communication. Literacy and media-diffusion figures offer vague parameters, especially in Asia, and the role of spoken communication -- considered key in "illiterate" societies -- is even more difficult to assess. For mass media, the starting point is "diffusion rates" representing numbers of TV sets owned or newspapers sold per 1000 population and so on -- measures of quantity. This article surveys the population growth rates, urban-rural distribution, educational levels, literacy rates, numbers of newspapers bought, radios and TVs owned (per 1000 population) for 12 Asian countries, and discusses their meaning in terms of media use. Chief among the points made are that print media still have an enormous role to play in the developing countries -- newspaper diffusion rates are quite high, even in countries with low urban population (especially India). The quality of electronic media (too often considered the natural "wave of the future" everywhere) varies but is generally not high. Where they are fully developed their role is vital -- but it might be noted that it is the message makers themselves who are most vital. Choosing the right medium and the proper message for it is essential.

  3. An Examination of Adolescent Recall of Anti-Smoking Messages: Attitudes, Message Type, and Message Perceptions.

    Bigsby, Elisabeth; Monahan, Jennifer L; Ewoldsen, David R

    2017-04-01

    Delayed message recall may be influenced by currently held accessible attitudes, the nature of the message, and message perceptions (perception of bias and message elaboration). This study examined the potential of message perceptions to mediate the influence of valenced attitude accessibility and message type on unaided recall of anti-smoking Public Service Announcements (PSAs). In a field experiment, ninth grade students (N = 244) watched three PSAs and responded to items on laptop computers. Twelve weeks later, follow-up telephone surveys were conducted to assess unaided recall. Both valenced attitude accessibility and message type were associated with message perceptions. However, only perception of message bias partially mediated the relationship between message type and unaided recall.

  4. Crafting a Real-Time Information Aggregator for Mobile Messaging

    Jenq-Shiou Leu

    2010-01-01

    Full Text Available Mobile messaging is evolving beyond SMS (Short Message Service text messaging with the introduction of MMS (Multimedia Messaging Service. In the past, such a scheme is used for peer-to-peer communication. Messages are generally displayed on a cellular phone with a limited-sized screen. However, such a visualizing process is not suitable to broadcast real-time SMS/MMS messages to people in public. To facilitate the instancy and publicity, we develop a real-time information aggregator—Visualizing SMS and MMS Messages System (VSMMS—to realize the concept by integrating SMS and MMS messaging over GSM/GPRS/UMTS onto a remote display device. The device exhibits messages on a larger display device in public. VSMMS features a revolutionized variation of mass media broadcasting. In this paper, we practically illustrate how to design and implement VSMMS and use a M/M/1 model to conduct a theoretical analysis about the message delay in the system queue. Meanwhile, we make an empirical performance evaluation about the message transmission time over different networks.

  5. Geomorphic evidence of active tectonics in the San Gorgonio Pass region of the San Andreas Fault system: an example of discovery-based research in undergraduate teaching

    Reinen, L. A.; Yule, J. D.

    2014-12-01

    Student-conducted research in courses during the first two undergraduate years can increase learning and improve student self-confidence in scientific study, and is recommended for engaging and retaining students in STEM fields (PCAST, 2012). At Pomona College, incorporating student research throughout the geology curriculum tripled the number of students conducting research prior to their senior year that culminated in a professional conference presentation (Reinen et al., 2006). Here we present an example of discovery-based research in Neotectonics, a second-tier course predominantly enrolling first-and second-year students; describe the steps involved in the four week project; and discuss early outcomes of student confidence, engagement and retention. In the San Gorgonio Pass region (SGPR) in southern California, the San Andreas fault undergoes a transition from predominantly strike-slip to a complex system of faults with significant dip-slip, resulting in diffuse deformation and raising the question of whether a large earthquake on the San Andreas could propagate through the region (Yule, 2009). In spring 2014, seven students in the Neotectonics course conducted original research investigating quantifiable geomorphic evidence of tectonic activity in the SGPR. Students addressed questions of [1] unequal uplift in the San Bernardino Mountains, [2] fault activity indicated by stream knick points, [3] the role of fault style on mountain front sinuosity, and [4] characteristic earthquake slip determined via fault scarp degradation models. Students developed and revised individual projects, collaborated with each other on methods, and presented results in a public forum. A final class day was spent reviewing the projects and planning future research directions. Pre- and post-course surveys show increases in students' self-confidence in the design, implementation, and presentation of original scientific inquiries. 5 of 6 eligible students participated in research the

  6. Popular Mobilization Messaging

    James Garrison

    2017-04-01

    Full Text Available This Research Paper examines the Iraqi Popular Mobilization Unit’s (PMU messaging on the organisation’s website and social media platforms through early January 2017 to develop a more nuanced understanding of the PMU’s outlook, both present and future. After providing an overview of the PMU’s media presence online, the paper discusses how the organisation promotes its core narrative: that it is a cross-confessional and patriotic force for the defence of all Iraqis against a brutal and evil IS. The paper then addresses the PMU’s use of messaging to refute the sectarian portrayal of the organisation in some quarters before turning to the way the PMU approaches regional and international states in its media. Finally, the paper summarises the PMU’s messaging strategy and discusses how this strategy implies a less threatening future for the organisation than is often anticipated.

  7. A message to school girls.

    Akinwande, A

    1993-06-01

    Information, education, and communication (IEC) programs need to be strengthened to appeal to adolescents, who are increasingly contributing to unwanted pregnancy and are using abortion as a means of birth control. Successful IEC programs have the following characteristics: 1) established communication theories that guide development of materials; 2) a multimedia and a mass media approach to information dissemination, and 3) emphasis on visual displays. The primary emphasis should be on presentation of a concise, clear message with the appropriate visual medium. Many communication specialists in developing countries, however, lack the training to design and use effective IEC software. Designing effective messages involves a process of integrating scientific ideas with artistic appeal. The aim is to stimulate the target audience to change its behavior of life style. The message must be convincing and contain practical and useful information. The IEC Software Design Cycle focuses on analysis and diagnosis, design production, pretesting and modification, and distribution and evaluation. Each of these processes are described. Necessary before any attempt is made is obtaining data on historical, sociocultural, and demographic characteristics, economic activities, health and social services, communication infrastructure, marriage and family life patterns, and decision making systems. Focus group discussions may be used to collect information about the target group. An example is given of the process of development, in a course through the Center or African Family Studies, of a poster about premarital sex directed to 11-16 year olds. On the basis of focus group discussions, it was decided that the message would be to encourage girls to talk with their mothers about family life and premarital sex. The poster was produced with 2 school girls talking in front of the school. The evaluation yielded modifications such as including a school building that resembled actual

  8. WebPASS Explorer (HR Personnel Management)

    US Agency for International Development — WebPass Explorer (WebPASS Framework): USAID is partnering with DoS in the implementation of their WebPass Post Personnel (PS) Module. WebPassPS does not replace...

  9. Multi-pass spectroscopic ellipsometry

    Stehle, Jean-Louis; Samartzis, Peter C.; Stamataki, Katerina; Piel, Jean-Philippe; Katsoprinakis, George E.; Papadakis, Vassilis; Schimowski, Xavier; Rakitzis, T. Peter; Loppinet, Benoit

    2014-01-01

    Spectroscopic ellipsometry is an established technique, particularly useful for thickness measurements of thin films. It measures polarization rotation after a single reflection of a beam of light on the measured substrate at a given incidence angle. In this paper, we report the development of multi-pass spectroscopic ellipsometry where the light beam reflects multiple times on the sample. We have investigated both theoretically and experimentally the effect of sample reflectivity, number of reflections (passes), angles of incidence and detector dynamic range on ellipsometric observables tanΨ and cosΔ. The multiple pass approach provides increased sensitivity to small changes in Ψ and Δ, opening the way for single measurement determination of optical thickness T, refractive index n and absorption coefficient k of thin films, a significant improvement over the existing techniques. Based on our results, we discuss the strengths, the weaknesses and possible applications of this technique. - Highlights: • We present multi-pass spectroscopic ellipsometry (MPSE), a multi-pass approach to ellipsometry. • Different detectors, samples, angles of incidence and number of passes were tested. • N passes improve polarization ratio sensitivity to the power of N. • N reflections improve phase shift sensitivity by a factor of N. • MPSE can significantly improve thickness measurements in thin films

  10. SMS Messaging Applications

    Pero, Nicola

    2009-01-01

    Cell phones are the most common communication device on the planet, and Short Message Service (SMS) is the chief channel for companies to offer services, accept requests, report news, and download binary files over cell phones. This guide describes the protocols and best practices (things that ensure you won't get sued or lose your right to offer a service) you need to know to make SMS messaging part of an organizational service. Issues such as character sets, differences among vendors, common practices in Europe and North America, and API choices are covered.

  11. The thermal and chemical evolution of hydrothermal vent fluids in shale hosted massive sulphide (SHMS) systems from the MacMillan Pass district (Yukon, Canada)

    Magnall, J. M.; Gleeson, S. A.; Blamey, N. J. F.; Paradis, S.; Luo, Y.

    2016-11-01

    At Macmillan Pass (YT, Canada), the hydrothermal vent complexes beneath two shale-hosted massive sulphide (SHMS) deposits (Tom, Jason) are well preserved within Late Devonian strata. These deposits provide a unique opportunity to constrain key geochemical parameters (temperature, salinity, pH, fO2, ΣS) that are critical for metal transport and deposition in SHMS systems, and to evaluate the interaction between hydrothermal fluids and the mudstone host rock. This has been achieved using a combination of detailed petrography, isotopic techniques (δ34S, δ13C and δ18O values), carbonate rare earth element analysis (LA-ICP-MS), fluid inclusion analysis (microthermometry, gas analysis via incremental crush fast scan mass spectrometry), and thermodynamic modelling. Two main paragenetic stages are preserved in both vent complexes: Stage 1 comprises pervasive ankerite alteration of the organic-rich mudstone host rock and crosscutting stockwork ankerite veining (±pyrobitumen, pyrite and quartz) and; Stage 2 consists of main stage massive sulphide (galena-pyrrhotite-pyrite ± chalcopyrite-sphalerite) and siderite (±quartz and barytocalcite) mineralisation. Co-variation of δ18O and δ13C values in ankerite can be described by temperature dependent fractionation and fluid rock interaction. Together with fluid inclusion microthermometry, this provides evidence of a steep thermal gradient (from 300 to ∼100 °C) over approximately 15 m stratigraphic depth, temporally and spatially constrained within the paragenesis of both vent complexes and developed under shallow lithostatic (28), characteristic of diagenetic fluids, are coupled with positive europium anomalies and variable light REE depletion, which are more consistent with chloride complexation in hot (>250 °C) hydrothermal fluids. In this shallow sub-seafloor setting, thermal alteration of organic carbon in the immature, chemically reactive mudstones also had an important role in the evolution of fluid chemistry

  12. Holocene slip rates along the San Andreas Fault System in the San Gorgonio Pass and implications for large earthquakes in southern California

    Heermance, Richard V.; Yule, Doug

    2017-06-01

    The San Gorgonio Pass (SGP) in southern California contains a 40 km long region of structural complexity where the San Andreas Fault (SAF) bifurcates into a series of oblique-slip faults with unknown slip history. We combine new 10Be exposure ages (Qt4: 8600 (+2100, -2200) and Qt3: 5700 (+1400, -1900) years B.P.) and a radiocarbon age (1260 ± 60 years B.P.) from late Holocene terraces with scarp displacement of these surfaces to document a Holocene slip rate of 5.7 (+2.7, -1.5) mm/yr combined across two faults. Our preferred slip rate is 37-49% of the average slip rates along the SAF outside the SGP (i.e., Coachella Valley and San Bernardino sections) and implies that strain is transferred off the SAF in this area. Earthquakes here most likely occur in very large, throughgoing SAF events at a lower recurrence than elsewhere on the SAF, so that only approximately one third of SAF ruptures penetrate or originate in the pass.Plain Language SummaryHow large are earthquakes on the southern San Andreas Fault? The answer to this question depends on whether or not the earthquake is contained only along individual fault sections, such as the Coachella Valley section north of Palm Springs, or the rupture crosses multiple sections including the area through the San Gorgonio Pass. We have determined the age and offset of faulted stream deposits within the San Gorgonio Pass to document slip rates of these faults over the last 10,000 years. Our results indicate a long-term slip rate of 6 mm/yr, which is almost 1/2 of the rates east and west of this area. These new rates, combined with faulted geomorphic surfaces, imply that large magnitude earthquakes must occasionally rupture a 300 km length of the San Andreas Fault from the Salton Sea to the Mojave Desert. Although many ( 65%) earthquakes along the southern San Andreas Fault likely do not rupture through the pass, our new results suggest that large >Mw 7.5 earthquakes are possible on the southern San Andreas Fault and likely

  13. Upon a Message-Oriented Trading API

    Claudiu VINTE

    2010-01-01

    Full Text Available In this paper, we introduce the premises for a trading system application-programming interface (API based on a message-oriented middleware (MOM, and present the results of our research regarding the design and the implementation of a simulation-trading system employing a service-oriented architecture (SOA and messaging. Our research has been conducted with the aim of creating a simulation-trading platform, within the academic environment, that will provide both the foundation for future experiments with trading systems architectures, components, APIs, and the framework for research on trading strategies, trading algorithm design, and equity markets analysis tools. Mathematics Subject Classification: 68M14 (distributed systems.

  14. TXT@WORK: pediatric hospitalists and text messaging.

    Kuhlmann, Stephanie; Ahlers-Schmidt, Carolyn R; Steinberger, Erik

    2014-07-01

    Many studies assess provider-patient communication through text messaging; however, minimal research has addressed communication among physicians. The purpose of this study was to evaluate the use of text messaging by pediatric hospitalists. A brief, anonymous, electronic survey was distributed through the American Academy of Pediatrics Section on Hospital Medicine Listserv in February 2012. Survey questions assessed work-related text messaging. Of the 106 pediatric hospitalist respondents, 97 met inclusion criteria. Most were female (73%) and had been in practice text messages, some (12%) more than 10 times per shift. More than half (53%) received work-related text messages when not at work. When asked to identify all potential work recipients, most often sent work-related text messages to other pediatric hospitalists (64%), fellows or resident physicians (37%), and subspecialists/consulting physicians (28%). When asked their preferred mode for brief communication, respondents' preferences varied. Many (46%) respondents worried privacy laws can be violated by sending/receiving text messages, and some (30%) reported having received protected health information (PHI) through text messages. However, only 11% reported their institution offered encryption software for text messaging. Physicians were using text messaging as a means of brief, work-related communication. Concerns arose regarding transfer of PHI using unsecure systems and work-life balance. Future research should examine accuracy and effectiveness of text message communication in the hospital, as well as patient privacy issues.

  15. Are Instant Messages Speech?

    Baron, Naomi S.

    Instant messaging (IM) is commonly viewed as a “spoken” medium, in light of its reputation for informality, non-standard spelling and punctuation, and use of lexical shortenings and emoticons. However, the actual nature of IM is an empirical issue that bears linguistic analysis.

  16. Microprocessorized message multiplexer

    Ejzman, S.; Guglielmi, L.; Jaeger, J.J.

    1980-07-01

    The 'Microprocessorized Message Multiplexer' is an elementary development tool used to create and debug the software of a target microprocessor (User Module: UM). It connects together four devices: a terminal, a cassette recorder, the target microprocessor and a host computer where macro and editor for the M 6800 microprocessor are resident [fr

  17. Grounding in Instant Messaging

    Fox Tree, Jean E.; Mayer, Sarah A.; Betts, Teresa E.

    2011-01-01

    In two experiments, we investigated predictions of the "collaborative theory of language use" (Clark, 1996) as applied to instant messaging (IM). This theory describes how the presence and absence of different grounding constraints causes people to interact differently across different communicative media (Clark & Brennan, 1991). In Study 1, we…

  18. The Prodiguer Messaging Platform

    Denvil, S.; Greenslade, M. A.; Carenton, N.; Levavasseur, G.; Raciazek, J.

    2015-12-01

    CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French global climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output are some of the complexities that CONVERGENCE aims to resolve.At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of French High Performance Computing (HPC) environments. The IPSL's simulation execution runtime libIGCM (library for IPSL Global Climate Modeling group) has recently been enhanced so as to support hitherto impossible realtime use cases such as simulation monitoring, data publication, metrics collection, simulation control, visualizations … etc. At the core of this enhancement is Prodiguer: an AMQP (Advanced Message Queue Protocol) based event driven asynchronous distributed messaging platform. libIGCM now dispatches copious amounts of information, in the form of messages, to the platform for remote processing by Prodiguer software agents at IPSL servers in Paris. Such processing takes several forms: Persisting message content to database(s); Launching rollback jobs upon simulation failure; Notifying downstream applications; Automation of visualization pipelines; We will describe and/or demonstrate the platform's: Technical implementation; Inherent ease of scalability; Inherent adaptiveness in respect to supervising simulations; Web portal receiving simulation notifications in realtime.

  19. 3. Secure Messaging

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 1. Electronic Commerce - Secure Messaging. V Rajaraman. Series Article Volume 6 Issue 1 January 2001 pp 8-17. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/01/0008-0017 ...

  20. Passing crisis and emergency risk communications: the effects of communication channel, information type, and repetition.

    Edworthy, Judy; Hellier, Elizabeth; Newbold, Lex; Titchener, Kirsteen

    2015-05-01

    Three experiments explore several factors which influence information transmission when warning messages are passed from person to person. In Experiment 1, messages were passed down chains of participants using five different modes of communication. Written communication channels resulted in more accurate message transmission than verbal. In addition, some elements of the message endured further down the chain than others. Experiment 2 largely replicated these effects and also demonstrated that simple repetition of a message eliminated differences between written and spoken communication. In a final field experiment, chains of participants passed information however they wanted to, with the proviso that half of the chains could not use telephones. Here, the lack of ability to use a telephone did not affect accuracy, but did slow down the speed of transmission from the recipient of the message to the last person in the chain. Implications of the findings for crisis and emergency risk communication are discussed. Copyright © 2015 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  1. STRATEGY AND EVALUATION OF THE OPERATION OF QUALITY MANAGEMENT SYSTEMS MEDICAL EDUCATION. THE FIRST MESSAGE. PROBLEM FORMULATION

    O. P. Mintser

    2015-09-01

    Full Text Available The article is devoted to functioning of the quality management by ISO 9001 standard. The problem of inefficient and non-working systems is pointed out, the causes of their inefficiency are investigated. The phenomenon of simultaneous existence of two parallel management systems: formal quality management system and living systems of managerial decisions making is studied. To study this situation the measure of «efficiency of quality management system» is introduced; further tasks for creating indicators and mechanisms for its evaluation are defined.

  2. Does the Screening Status of Message Characters Affect Message Effects?

    Alber, Julia M.; Glanz, Karen

    2018-01-01

    Public health messages can be used to increase awareness about colorectal cancer screenings. Free or inexpensive images for creating health messages are readily available, yet little is known about how a pictured individual's engagement in the behavior of interest affects message outcomes. Participants (N = 360), aged 50 to 75 years, completed an…

  3. The Puerto Rico Seismic Network Broadcast System: A user friendly GUI to broadcast earthquake messages, to generate shakemaps and to update catalogues

    Velez, J.; Huerfano, V.; von Hillebrandt, C.

    2007-12-01

    The Puerto Rico Seismic Network (PRSN) has historically provided locations and magnitudes for earthquakes in the Puerto Rico and Virgin Islands (PRVI) region. PRSN is the reporting authority for the region bounded by latitudes 17.0N to 20.0N, and longitudes 63.5W to 69.0W. The main objective of the PRSN is to record, process, analyze, provide information and research local, regional and teleseismic earthquakes, providing high quality data and information to be able to respond to the needs of the emergency management, academic and research communities, and the general public. The PRSN runs Earthworm software (Johnson et al, 1995) to acquire and write waveforms to disk for permanent archival. Automatic locations and alerts are generated for events in Puerto Rico, the Intra America Seas, and the Atlantic by the EarlyBird system (Whitmore and Sokolowski, 2002), which monitors PRSN stations as well as some 40 additional stations run by networks operating in North, Central and South America and other sites in the Caribbean. PRDANIS (Puerto Rico Data Analysis and Information System) software, developed by PRSN, supports manual locations and analyst review of automatic locations of events within the PRSN area of responsibility (AOR), using all the broadband, strong-motion and short-period waveforms Rapidly available information regarding the geographic distribution of ground shaking in relation to the population and infrastructure at risk can assist emergency response communities in efficient and optimized allocation of resources following a large earthquake. The ShakeMap system developed by the USGS provides near real-time maps of instrumental ground motions and shaking intensity and has proven effective in rapid assessment of the extent of shaking and potential damage after significant earthquakes (Wald, 2004). In Northern and Southern California, the Pacific Northwest, and the states of Utah and Nevada, ShakeMaps are used for emergency planning and response, loss

  4. EDITORIAL: Message from the Editor

    Thomas, Paul

    2009-01-01

    Fusion is based on high quality full length articles. However, in the words of the journal home page, `Nuclear Fusion welcomes Letters as a means to quickly communicate new, maybe preliminary, results which make a significant advancement of the knowledge in the field. Letters should be comprehensive and short, aiming for four printed pages including figures.' I would like to take the opportunity to reiterate this message and to say that, as Editor, I would welcome the submission of high quality Letters. Publishing procedures In-house, Nuclear Fusion's publishing procedures are subject to continuous scrutiny for potential improvements. Of particular note from 2008 are faster than ever peer review and publishing times that have been achieved despite the very rigorous processing to which submissions are subject. Readers may have noticed the implementation of the new article numbering system, announced by the Publisher, Yasmin McGlashan in 2008 Nucl. Fusion 48 010101. This new scheme gives us more flexibilty and has led to faster online publication. The Nuclear Fusion Office and IOP Publishing Just as the journal depends on the authors and referees, so its success is also due to the tireless and largely unsung efforts of the Nuclear Fusion Office in Vienna and IOP Publishing in Bristol. I would like to express my personal thanks to Maria, Katja, Sophy, Sarah, Rachael and Yasmin for the support that they have given to me, the authors and the referees. Season's Greetings I would like to wish our readers, authors, referees and Board of Editors a successful and happy 2009 and thank them for their contributions to Nuclear Fusion in 2008.

  5. Degree sequence in message transfer

    Yamuna, M.

    2017-11-01

    Message encryption is always an issue in current communication scenario. Methods are being devised using various domains. Graphs satisfy numerous unique properties which can be used for message transfer. In this paper, I propose a message encryption method based on degree sequence of graphs.

  6. Your Co-author Received 150 Citations: Pride, but Not Envy, Mediates the Effect of System-Generated Achievement Messages on Motivation.

    Utz, Sonja; Muscanell, Nicole L

    2018-01-01

    ResearchGate, a social network site for academics, prominently displays the achievements of people one follows ("With 150 new reads, X was the most read author from their institute"). The goal of this paper was to examine the emotional and motivational effects of these system-generated messages, thereby extending prior research on envy-evoking status updates on Facebook to a professional context. We also extend the research on social comparisons and more broadly, on emotional responses elicited by social media. Specifically, social media research has largely focused on examining emotional reactions to content that is both generated by and is about others. In this research we directly examine updates generated by the system (ResearchGate) while also directly comparing reactions to updates about others' achievements with reactions to updates that are about the self-i.e., one's personal achievements which are also displayed on ResearchGate ("With 150 new reads, you were the most read author from your institute"). Particular attention was paid to the mediating role of envy and pride. The results of our quasi-experimental field study ( n = 419) showed that the achievements of others elicited envy, whereas personal achievements elicited pride. People exposed to their personal achievements (vs. the achievement of others) showed a higher motivation to work harder. This effect was mediated by pride, but not envy. The theoretical and practical implications of these findings are discussed.

  7. Your Co-author Received 150 Citations: Pride, but Not Envy, Mediates the Effect of System-Generated Achievement Messages on Motivation

    Utz, Sonja; Muscanell, Nicole L.

    2018-01-01

    ResearchGate, a social network site for academics, prominently displays the achievements of people one follows (“With 150 new reads, X was the most read author from their institute”). The goal of this paper was to examine the emotional and motivational effects of these system-generated messages, thereby extending prior research on envy-evoking status updates on Facebook to a professional context. We also extend the research on social comparisons and more broadly, on emotional responses elicited by social media. Specifically, social media research has largely focused on examining emotional reactions to content that is both generated by and is about others. In this research we directly examine updates generated by the system (ResearchGate) while also directly comparing reactions to updates about others’ achievements with reactions to updates that are about the self—i.e., one’s personal achievements which are also displayed on ResearchGate (“With 150 new reads, you were the most read author from your institute”). Particular attention was paid to the mediating role of envy and pride. The results of our quasi-experimental field study (n = 419) showed that the achievements of others elicited envy, whereas personal achievements elicited pride. People exposed to their personal achievements (vs. the achievement of others) showed a higher motivation to work harder. This effect was mediated by pride, but not envy. The theoretical and practical implications of these findings are discussed. PMID:29780339

  8. Your Co-author Received 150 Citations: Pride, but Not Envy, Mediates the Effect of System-Generated Achievement Messages on Motivation

    Sonja Utz

    2018-05-01

    Full Text Available ResearchGate, a social network site for academics, prominently displays the achievements of people one follows (“With 150 new reads, X was the most read author from their institute”. The goal of this paper was to examine the emotional and motivational effects of these system-generated messages, thereby extending prior research on envy-evoking status updates on Facebook to a professional context. We also extend the research on social comparisons and more broadly, on emotional responses elicited by social media. Specifically, social media research has largely focused on examining emotional reactions to content that is both generated by and is about others. In this research we directly examine updates generated by the system (ResearchGate while also directly comparing reactions to updates about others’ achievements with reactions to updates that are about the self—i.e., one’s personal achievements which are also displayed on ResearchGate (“With 150 new reads, you were the most read author from your institute”. Particular attention was paid to the mediating role of envy and pride. The results of our quasi-experimental field study (n = 419 showed that the achievements of others elicited envy, whereas personal achievements elicited pride. People exposed to their personal achievements (vs. the achievement of others showed a higher motivation to work harder. This effect was mediated by pride, but not envy. The theoretical and practical implications of these findings are discussed.

  9. Message from Fermilab Director

    2009-01-01

    With this issue’s message, Fermilab Director Pier Oddone opens a new series of occasional exchanges between CERN and other laboratories world-wide. As part of this exchange, CERN Director-General Rolf Heuer, wrote a message in Tuesday’s edition of Fermilab TodayPerspectivesNothing is more important for our worldwide particle physics community than successfully turning on the LHC later this year. The promise for great discoveries is huge, and many of the plans for our future depend on LHC results. Those of us planning national programmes in anticipation of data from the LHC face formidable challenges to develop future facilities that are complementary to the LHC, whatever the physics discoveries may be. At Fermilab, this has led us to move forcefully with a programme at the intensity frontier, where experiments with neutrinos and rare decays open a complementary window into nature. Our ultimate goal for a unified picture of nat...

  10. The Information Ecology of Personal Health Record Systems: Secure Messaging as Catalyst and Its Evolving Impact on Use and Consequences

    Nazi, Kim M.

    2012-01-01

    Personal Health Records (PHRs) and PHR systems have been designed as consumer-oriented tools to empower patients and improve health care. Despite significant consumer interest and anticipated benefits, adoption remains low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications…

  11. Effects of low speed wind on the recognition/identification and pass-through communication tasks of auditory situation awareness afforded by military hearing protection/enhancement devices and tactical communication and protective systems.

    Lee, Kichol; Casali, John G

    2016-01-01

    To investigate the effect of controlled low-speed wind-noise on the auditory situation awareness performance afforded by military hearing protection/enhancement devices (HPED) and tactical communication and protective systems (TCAPS). Recognition/identification and pass-through communications tasks were separately conducted under three wind conditions (0, 5, and 10 mph). Subjects wore two in-ear-type TCAPS, one earmuff-type TCAPS, a Combat Arms Earplug in its 'open' or pass-through setting, and an EB-15LE electronic earplug. Devices with electronic gain systems were tested under two gain settings: 'unity' and 'max'. Testing without any device (open ear) was conducted as a control. Ten subjects were recruited from the student population at Virginia Tech. Audiometric requirements were 25 dBHL or better at 500, 1000, 2000, 4000, and 8000 Hz in both ears. Performance on the interaction of communication task-by-device was significantly different only in 0 mph wind speed. The between-device performance differences varied with azimuthal speaker locations. It is evident from this study that stable (non-gusting) wind speeds up to 10 mph did not significantly degrade recognition/identification task performance and pass-through communication performance of the group of HPEDs and TCAPS tested. However, the various devices performed differently as the test sound signal speaker location was varied and it appears that physical as well as electronic features may have contributed to this directional result.

  12. Designing Integrated Approaches to Support People with Multimorbidity: Key Messages from Systematic Reviews, Health System Leaders and Citizens.

    Wilson, Michael G; Lavis, John N; Gauvin, Francois-Pierre

    2016-11-01

    Living with multiple chronic conditions (multimorbidity) - and facing complex, uncoordinated and fragmented care - is part of the daily life of a growing number of Canadians. We undertook: a knowledge synthesis; a "gap analysis" of existing systematic reviews; an issue brief that synthesized the available evidence about the problem, three options for addressing it and implementation considerations; a stakeholder dialogue involving key health-system leaders; and a citizen panel. We identified several recommendations for actions that can be taken, including: developing evidence-based guidance that providers can use to help achieve goals set by patients; embracing approaches to supporting self-management; supporting greater communication and collaboration across healthcare providers as well as between healthcare providers and patients; and investing more efforts in health promotion and disease prevention. Our results point to the need for health system decision-makers to support bottom-up, person-centred approaches to developing models of care that are tailored for people with multimorbidity and support a research agenda to address the identified priorities. Copyright © 2016 Longwoods Publishing.

  13. An Investigation into Patient Non-Attendance and Use of a Short-Message Reminder System at a University Dental Clinic.

    Storrs, Mark J; Ramov, Helen M; Lalloo, Ratilal

    2016-01-01

    Non-attended appointments in health care facilities create inefficiencies and loss of clinical productivity: clinical teaching hours are reduced, impacting students' ability to meet the competencies necessary for professional registration. The aim of this study was to assess demographic and time-related factors for patient non-attendance at a dental school clinic in Australia. Appointment data were extracted from the patient management system for the years 2011 and 2012. Data included the status of appointment (attended, cancelled, or failed to attend [FTA]) and an array of demographic and time-related factors. Multinomial logistic regression was conducted to assess relationships between these factors and appointment status. Attendance rates were also compared by year following implementation of a short message service (SMS) reminder at the beginning of 2012. The results showed that, of 58,622 appointments booked with students during 2011 and 2012, 68% of patients attended, 23% cancelled, and 9% were FTA. The percentage of non-attended (cancelled or FTA) appointments differed by demographic and time-related factors. Females were 7% less likely to be FTA, those aged 16-24 years were five times more likely to be FTA, and early morning appointments were 18% less likely to be cancelled and FTA. With the SMS reminder system, the odds of a cancellation were 15% higher, but FTAs were 14% lower (both were statistically significant differences). This study found that failing to attend an appointment was significantly related to a number of factors. Clinical scheduling and reminder systems may need to take these factors into account to decrease the number of teaching hours lost due to patients' missing their appointments.

  14. AMS: Area Message Service for SLC

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-01-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require an application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI open-quote C close-quote and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  15. Synthesis and PASS-assisted in silico approach of some novel 2-substituted benzimidazole bearing a pyrimidine-2, 4, 6(trione system as mucomembranous protector

    Bijo Mathew

    2013-01-01

    Full Text Available Purpose: The present paper demonstrates the utility of PASS computer-aided program and makes a clear comparison of predicted and observed pharmacological properties of some novel 5-[(2E-1-(1H-benzimidazol-2-yl-3-substituted phenylprop-2-en-1-ylidene] pyrimidine-2, 4, 6 (1H, 3H, 5H-triones (5a-f. Materials and Methods: The synthesis of the titled derivatives were achieved by the reaction between 2E-1-(1H-benzimidazol-2-yl-3-phenylprop-2-en-1-ones (4a-f and barbituric acid in the presence of catalytic amount of acetic acid medium. All the final structures were assigned on the basis of IR, 1 HNMR and mass spectra analysis. All the newly synthesized compounds were screened for their antiulcer activity in the pylorus-ligated rats. Results: Compounds 5b, 5e and 5c showed a percentage protection of (69.58, 69.56 and 67.17 at a dose of 50 mg/kg b.w. when compared to standard omeprazole (77.37%, 2 mg/kg b.w.. Conclusion: Scanning of stomach specimens using electron microscope revealed that the mice treated with standard and synthetic derivatives had no injury observed in stomach mucosa, which is identical to that of the control animal.

  16. Nuclear fuel cycle modelling using MESSAGE

    Guiying Zhang; Dongsheng Niu; Guoliang Xu; Hui Zhang; Jue Li; Lei Cao; Zeqin Guo; Zhichao Wang; Yutong Qiu; Yanming Shi; Gaoliang Li

    2017-01-01

    In order to demonstrate the possibilities of application of MESSAGE tool for the modelling of a Nuclear Energy System at the national level, one of the possible open nuclear fuel cycle options based on thermal reactors has been modelled using MESSAGE. The steps of the front-end and back-end of nuclear fuel cycle and nuclear reactor operation are described. The optimal structure for Nuclear Power Development and optimal schedule for introducing various reactor technologies and fuel cycle options; infrastructure facilities, nuclear material flows and waste, investments and other costs are demonstrated. (author)

  17. Broadcasting a message in a parallel computer

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  18. Message transfer in a communication network

    Examples of transport processes on networks include the traffic of informa- tion packets [1–4], transport processes on biological networks [5,6], and road traffic. ... for this system. In the case of single message transfer, we study the dependence of average travel times on the hub density, and find that travel times fall off as a.

  19. Graphical route information on variable message signs

    Alkim, T.P.; Mede, P.H.J. van der; Janssen, W.H.

    2002-01-01

    Reports on experiments in the Netherlands on the use of graphical route information panels (GRIP) as part of variable message systems (VMS) providing information to drivers. GRIP appear to be as safe as regular VMS. Digestion of the information presented is initially quicker for regular VMS, but

  20. Using Instant Messaging for Online Reference Service

    Forster, Shirley

    2006-01-01

    Many libraries are using co-browsing chat products to provide reference services to their patrons, whilst their patrons are online and using the internet. The concept of such an online service is highly desirable, but many libraries are concerned that they will never be able to afford such a system. This may have changed: Instant Messaging (IM)…

  1. Creating buzz: the neural correlates of effective message propagation.

    Falk, Emily B; Morelli, Sylvia A; Welborn, B Locke; Dambacher, Karl; Lieberman, Matthew D

    2013-07-01

    Social interaction promotes the spread of values, attitudes, and behaviors. Here, we report on neural responses to ideas that are destined to spread. We scanned message communicators using functional MRI during their initial exposure to the to-be-communicated ideas. These message communicators then had the opportunity to spread the messages and their corresponding subjective evaluations to message recipients outside the scanner. Successful ideas were associated with neural responses in the communicators' mentalizing systems and reward systems when they first heard the messages, prior to spreading them. Similarly, individuals more able to spread their own views to others produced greater mentalizing-system activity during initial encoding. Unlike prior social-influence studies that focused on the individuals being influenced, this investigation focused on the brains of influencers. Successful social influence is reliably associated with an influencer-to-be's state of mind when first encoding ideas.

  2. Short Message System (SMS) revisited

    Simonsen, Eivind Ortind; Dahl, Mads Ronald

    In a rapidly changing world of technology, communication and information is everywhere around us. Technology is constantly moving the frontier for what is possible and having an increasing impact on education. New inventions create new ways of effective mass communication and the expectations from...... to meet this challenge is to make use of new technological achievements in some novel way (CMS, LMS, VLE, RSS etc.). Another way is to take one step backwards, and employ an older technology that is stable and which people are familiar with. At the Faculty of Health, Aarhus University, Denmark, the latter...

  3. GOOF: OCTOPUS error messages, ORDER, ORDERLIB, FLOE, CHAT, and LOD

    Whitten, G.

    1977-07-10

    This is a compilation of the error messages returned by five parts of the Livermore timesharing system: the ORDER batch-processor, the ORDERLIB subroutine library, the FLOE operating system, the CHAT compiler, and the LOD loader.

  4. Instant messaging at the hospital: supporting articulation work?

    Iversen, Tobias Buschmann; Melby, Line; Toussaint, Pieter

    2013-09-01

    Clinical work is increasingly fragmented and requires extensive articulation and coordination. Computer systems may support such work. In this study, we investigate how instant messaging functions as a tool for supporting articulation work at the hospital. This paper aims to describe the characteristics of instant messaging communication in terms of number and length of messages, distribution over time, and the number of participants included in conversations. We also aim to determine what kind of articulation work is supported by analysing message content. Analysis of one month's worth of instant messages sent through the perioperative coordination and communication system at a Danish hospital. Instant messaging was found to be used extensively for articulation work, mostly through short, simple conversational exchanges. It is used particularly often for communication concerning the patient, specifically, the coordination and logistics of patient care. Instant messaging is used by all actors involved in the perioperative domain. Articulation work and clinical work are hard to separate in a real clinical setting. Predefined messages and strict workflow design do not suffice when supporting communication in the context of collaborative clinical work. Flexibility is of vital importance, and this needs to be reflected in the design of supportive communication systems. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  5. Survey of Instant Messaging Applications Encryption Methods

    Kabakuş, Abdullah; Kara, Resul

    2015-01-01

    Instant messaging applications has already taken the place of traditional Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage easement they provide. Users of instant messaging applications are able to send both text and audio messages, different types of attachments such as photos, videos, contact information to their contacts in real time. Because of instant messaging applications use internet instead of Short Message Service Technical Reali...

  6. Geomorphic and geologic evidence for slip along the San Bernardino strand of the San Andreas Fault System through the San Gorgonio Pass structural knot, southern California

    Kendrick, K. J.; Matti, J. C.

    2017-12-01

    The San Gorgonio Pass (SGP) region of southern California represents an extraordinarily complex section of the San Andreas Fault (SAF) zone, often referred to as a structural knot. Complexity is expressed both structurally and geomorphically, and arises because multiple strands of the SAF have evolved here in Quaternary time. Our integration of geologic and geomorphic analyses led to recognition of multiple fault-bounded blocks characterized by crystalline rocks that have similar physical properties. Hence, any morphometric differences in hypsometric analysis, slope, slope distribution, texture, and stream-power measurements and discontinuities reflect landscape response to tectonic processes rather than differences in lithology. We propose that the differing morphometry of the two blocks on either side of the San Bernardino strand (SBS) of the SAF, the high-standing Kitching Peak block to the east and the lower, more subdued Pisgah Peak block to the west, strongly suggests that the blocks experienced different uplift histories. This difference in uplift histories, in turn suggests that dextral slip occurred over a long time interval on the SBS—despite long-lived controversy raised by the fact that, at the surface, a throughgoing trace of the SBS is not present at this location. A different tectonic history between the two blocks is consistent with the gravity data which indicate that low-density rocks underthrusting the Kitching Peak block are absent below the Pisgah Peak block (Langenheim et al., 2015). Throughgoing slip on the SBS implied by geomorphic differences between the two blocks is also consistent with displaced geologic and geomorphic features. We find compelling evidence for discrete offsets of between 0.6 and 6 km of dextral slip on the SBS, including offset of fluvial and landslide deposits, and beheaded drainages. Although we lack numerical age control for the offset features, the degree of soil development associated with displaced landforms

  7. What motivates consumers to re-tweet brand content? The impact of information, emotion, and traceability on pass-along behavior

    Araujo, T.; Neijens, P.; Vliegenthart, R.

    2015-01-01

    How do certain cues influence pass-along behavior (re-Tweeting) of brand messages on Twitter? Analyzing 19,343 global brand messages over a three-year period, the authors of this article found that informational cues were predictors of higher levels of re-Tweeting, particularly product details and

  8. Randomized Trial of a Smartphone Mobile Application Compared to Text Messaging to Support Smoking Cessation

    Buller, David B.; Borland, Ron; Bettinghaus, Erwin P.; Shane, James H.; Zimmerman, Donald E.

    2014-01-01

    Background: Text messaging has successfully supported smoking cessation. This study compares a mobile application with text messaging to support smoking cessation. Materials and Methods: Young adult smokers 18–30 years old (n=102) participated in a randomized pretest–posttest trial. Smokers received a smartphone application (REQ-Mobile) with short messages and interactive tools or a text messaging system (onQ), managed by an expert system. Self-reported usability of REQ-Mobile and qu...

  9. Alternative Data Storage Solution for Mobile Messaging Services

    David C. C. Ong

    2007-01-01

    Full Text Available In recent years, mobile devices have become relatively more powerful with additional features which have the capability to provide multimedia streaming. Better, faster and more reliable data storage solutions in the mobile messaging platform have become more essential with these additional improvements. The existing mobile messaging infrastructure, in particular the data storage platform has become less proficient in coping with the increased demand for its services. This demand especially in the mobile messaging area (i.e. SMS – Short Messaging Service, MMS – Multimedia Messaging Service, which may well exceeded 250,000 requests per second, means that the need to evaluate competing data management systems has become not only necessary but essential. This paper presents an evaluation of SMS and MMS platforms using different database management systems – DBMS and recommends the best data management strategies for these platforms.

  10. The Devil Is in the Details: Evidence from the GED on the Role of Examination System Details in Determining Who Passes. NCSALL Reports #16.

    Tyler, John H.; Murnane, Richard J.; Willett, John B.

    A study used data from a long-standing examination system, the General Educational Development (GED) certificate, to illustrate that the details of examination systems have marked impacts on the number of test takers who obtain the desired credential and on the racial/ethnic composition of passers. Data provided by the Florida Department of…

  11. Connecticut church passes genetics resolution.

    Culliton, B J

    1984-11-09

    The Connecticut Conference of the United Church of Christ, which represents the largest Protestant denomination in the state, has passed a resolution affirming an ethical duty to do research on human gene therapy and is planning to form local church groups to study the scientific and ethical issues involved. The resolution is intended to counter an earlier one proposed by Jeremy Rifkin to ban all efforts at engineering specific traits into the human germline. The Rifkin proposal had been endorsed by a large number of religious leaders, including the head of the U.S. United Church of Christ, but was subsequently characterized by many of the church leaders as overly restrictive.

  12. Axioms for behavioural congruence of single-pass instruction sequences

    Bergstra, J.A.; Middelburg, C.A.

    2017-01-01

    In program algebra, an algebraic theory of single-pass instruction sequences, three congruences on instruction sequences are paid attention to: instruction sequence congruence, structural congruence, and behavioural congruence. Sound and complete axiom systems for the first two congruences were

  13. Individual differences in drivers' cognitive processing of road safety messages.

    Kaye, Sherrie-Anne; White, Melanie J; Lewis, Ioni M

    2013-01-01

    Using Gray and McNaughton's (2000) revised reinforcement sensitivity theory (r-RST), we examined the influence of personality on processing of words presented in gain-framed and loss-framed anti-speeding messages and how the processing biases associated with personality influenced message acceptance. The r-RST predicts that the nervous system regulates personality and that behaviour is dependent upon the activation of the behavioural activation system (BAS), activated by reward cues and the fight-flight-freeze system (FFFS), activated by punishment cues. According to r-RST, individuals differ in the sensitivities of their BAS and FFFS (i.e., weak to strong), which in turn leads to stable patterns of behaviour in the presence of rewards and punishments, respectively. It was hypothesised that individual differences in personality (i.e., strength of the BAS and the FFFS) would influence the degree of both message processing (as measured by reaction time to previously viewed message words) and message acceptance (measured three ways by perceived message effectiveness, behavioural intentions, and attitudes). Specifically, it was anticipated that, individuals with a stronger BAS would process the words presented in the gain-frame messages faster than those with a weaker BAS and individuals with a stronger FFFS would process the words presented in the loss-frame messages faster than those with a weaker FFFS. Further, it was expected that greater processing (faster reaction times) would be associated with greater acceptance for that message. Driver licence holding students (N=108) were recruited to view one of four anti-speeding messages (i.e., social gain-frame, social loss-frame, physical gain-frame, and physical loss-frame). A computerised lexical decision task assessed participants' subsequent reaction times to message words, as an indicator of the extent of processing of the previously viewed message. Self-report measures assessed personality and the three message

  14. Lay health supporters aided by a mobile phone messaging system to improve care of villagers with schizophrenia in Liuyang, China: protocol for a randomised control trial.

    Xu, Dong Roman; Gong, Wenjie; Caine, Eric D; Xiao, Shuiyuan; Hughes, James P; Ng, Marie; Simoni, Jane; He, Hua; Smith, Kirk L; Brown, Henry Shelton; Gloyd, Stephen

    2016-01-20

    Schizophrenia is a severe, chronic and disabling mental illness. Non-adherence to medication and relapse may lead to poorer patient function. This randomised controlled study, under the acronym LEAN (Lay health supporter, e-platform, award, and iNtegration), is designed to improve medication adherence and high relapse among people with schizophrenia in resource poor settings. The community-based LEAN has four parts: (1) Lay health supporters (LHSs), mostly family members who will help supervise patient medication, monitor relapse and side effects, and facilitate access to care, (2) an E-platform to support two-way mobile text and voice messaging to remind patients to take medication; and alert LHSs when patients are non-adherent, (3) an Award system to motivate patients and strengthen LHS support, and (4) iNtegration of the efforts of patients and LHSs with those of village doctors, township mental health administrators and psychiatrists via the e-platform. A random sample of 258 villagers with schizophrenia will be drawn from the schizophrenic '686' Program registry for the 9 Xiang dialect towns of the Liuyang municipality in China. The sample will be further randomised into a control group and a treatment group of equal sizes, and each group will be followed for 6 months after launch of the intervention. The primary outcome will be medication adherence as measured by pill counts and supplemented by pharmacy records. Other outcomes include symptoms and level of function. Outcomes will be assessed primarily when patients present for medication refill visits scheduled every 2 months over the 6-month follow-up period. Data from the study will be analysed using analysis of covariance for the programme effect and an intent-to-treat approach. University of Washington: 49464 G; Central South University: CTXY-150002-6. Results will be published in peer-reviewed journals with deidentified data made available on FigShare. ChiCTR-ICR-15006053; Pre-results. Published by the

  15. Lay health supporters aided by a mobile phone messaging system to improve care of villagers with schizophrenia in Liuyang, China: protocol for a randomised control trial

    Gong, Wenjie; Caine, Eric D; Xiao, Shuiyuan; Hughes, James P; Ng, Marie; Simoni, Jane; He, Hua; Smith, Kirk L; Brown, Henry Shelton; Gloyd, Stephen

    2016-01-01

    Introduction Schizophrenia is a severe, chronic and disabling mental illness. Non-adherence to medication and relapse may lead to poorer patient function. This randomised controlled study, under the acronym LEAN (Lay health supporter, e-platform, award, and iNtegration), is designed to improve medication adherence and high relapse among people with schizophrenia in resource poor settings. Methods/analysis The community-based LEAN has four parts: (1) Lay health supporters (LHSs), mostly family members who will help supervise patient medication, monitor relapse and side effects, and facilitate access to care, (2) an E-platform to support two-way mobile text and voice messaging to remind patients to take medication; and alert LHSs when patients are non-adherent, (3) an Award system to motivate patients and strengthen LHS support, and (4) iNtegration of the efforts of patients and LHSs with those of village doctors, township mental health administrators and psychiatrists via the e-platform. A random sample of 258 villagers with schizophrenia will be drawn from the schizophrenic ‘686’ Program registry for the 9 Xiang dialect towns of the Liuyang municipality in China. The sample will be further randomised into a control group and a treatment group of equal sizes, and each group will be followed for 6 months after launch of the intervention. The primary outcome will be medication adherence as measured by pill counts and supplemented by pharmacy records. Other outcomes include symptoms and level of function. Outcomes will be assessed primarily when patients present for medication refill visits scheduled every 2 months over the 6-month follow-up period. Data from the study will be analysed using analysis of covariance for the programme effect and an intent-to-treat approach. Ethics and dissemination University of Washington: 49464 G; Central South University: CTXY-150002-6. Results will be published in peer-reviewed journals with deidentified data made available on

  16. Computer-aided system of evaluation for population-based all-in-one service screening (CASE-PASS): from study design to outcome analysis with bias adjustment.

    Chen, Li-Sheng; Yen, Amy Ming-Fang; Duffy, Stephen W; Tabar, Laszlo; Lin, Wen-Chou; Chen, Hsiu-Hsi

    2010-10-01

    Population-based routine service screening has gained popularity following an era of randomized controlled trials. The evaluation of these service screening programs is subject to study design, data availability, and the precise data analysis for adjusting bias. We developed a computer-aided system that allows the evaluation of population-based service screening to unify these aspects and facilitate and guide the program assessor to efficiently perform an evaluation. This system underpins two experimental designs: the posttest-only non-equivalent design and the one-group pretest-posttest design and demonstrates the type of data required at both the population and individual levels. Three major analyses were developed that included a cumulative mortality analysis, survival analysis with lead-time adjustment, and self-selection bias adjustment. We used SAS AF software to develop a graphic interface system with a pull-down menu style. We demonstrate the application of this system with data obtained from a Swedish population-based service screen and a population-based randomized controlled trial for the screening of breast, colorectal, and prostate cancer, and one service screening program for cervical cancer with Pap smears. The system provided automated descriptive results based on the various sources of available data and cumulative mortality curves corresponding to the study designs. The comparison of cumulative survival between clinically and screen-detected cases without a lead-time adjustment are also demonstrated. The intention-to-treat and noncompliance analysis with self-selection bias adjustments are also shown to assess the effectiveness of the population-based service screening program. Model validation was composed of a comparison between our adjusted self-selection bias estimates and the empirical results on effectiveness reported in the literature. We demonstrate a computer-aided system allowing the evaluation of population-based service screening

  17. Comparison of cryogenic low-pass filters

    Thalmann, M.; Pernau, H.-F.; Strunk, C.; Scheer, E.; Pietsch, T.

    2017-11-01

    Low-temperature electronic transport measurements with high energy resolution require both effective low-pass filtering of high-frequency input noise and an optimized thermalization of the electronic system of the experiment. In recent years, elaborate filter designs have been developed for cryogenic low-level measurements, driven by the growing interest in fundamental quantum-physical phenomena at energy scales corresponding to temperatures in the few millikelvin regime. However, a single filter concept is often insufficient to thermalize the electronic system to the cryogenic bath and eliminate spurious high frequency noise. Moreover, the available concepts often provide inadequate filtering to operate at temperatures below 10 mK, which are routinely available now in dilution cryogenic systems. Herein we provide a comprehensive analysis of commonly used filter types, introduce a novel compact filter type based on ferrite compounds optimized for the frequency range above 20 GHz, and develop an improved filtering scheme providing adaptable broad-band low-pass characteristic for cryogenic low-level and quantum measurement applications at temperatures down to few millikelvin.

  18. Comparison of cryogenic low-pass filters.

    Thalmann, M; Pernau, H-F; Strunk, C; Scheer, E; Pietsch, T

    2017-11-01

    Low-temperature electronic transport measurements with high energy resolution require both effective low-pass filtering of high-frequency input noise and an optimized thermalization of the electronic system of the experiment. In recent years, elaborate filter designs have been developed for cryogenic low-level measurements, driven by the growing interest in fundamental quantum-physical phenomena at energy scales corresponding to temperatures in the few millikelvin regime. However, a single filter concept is often insufficient to thermalize the electronic system to the cryogenic bath and eliminate spurious high frequency noise. Moreover, the available concepts often provide inadequate filtering to operate at temperatures below 10 mK, which are routinely available now in dilution cryogenic systems. Herein we provide a comprehensive analysis of commonly used filter types, introduce a novel compact filter type based on ferrite compounds optimized for the frequency range above 20 GHz, and develop an improved filtering scheme providing adaptable broad-band low-pass characteristic for cryogenic low-level and quantum measurement applications at temperatures down to few millikelvin.

  19. Two-way text messaging: an interactive mobile learning environment in higher education

    Premadasa, H. K. Salinda; Meegama, R. G. N.

    2016-01-01

    Short messaging service (SMS) is perhaps the most popular mobile technology prevalent among students in higher education due to its ubiquitous nature and the capability of two-way communication. However, a major limitation in two-way text messaging is sending back a part of received data with the reply message. This limitation results in users of a mobile learning environment being unable to reply back to the correct destination. This article presents a two-way text messaging system that can ...

  20. A Down-to-Earth Educational Operating System for Up-in-the-Cloud Many-Core Architectures

    Ziwisky, Michael; Persohn, Kyle; Brylow, Dennis

    2013-01-01

    We present "Xipx," the first port of a major educational operating system to a processor in the emerging class of many-core architectures. Through extensions to the proven Embedded Xinu operating system, Xipx gives students hands-on experience with system programming in a distributed message-passing environment. We expose the software primitives…

  1. WebPASS ICASS (HR Personnel Management)

    US Agency for International Development — WebPASS Joint Administrative Support Platforms Post Administrative Software Suite - U.S. Department of State Executive Officers application suite. Web.PASS is the...

  2. Education and training in radiation protection: a challenge in passing on a difficult and intricate message

    Sabol, Jozef; Hudzietzova, Jana; Rosina, Jozef, E-mail: j.sabol44@gmail.com, E-mail: hudzijan@fbmi.cvut.cz, E-mail: rosina@fbmi.cvut.cz [Faculty of Biomedical Engineering, Czech Technical University in Prague (Czech Republic)

    2013-07-01

    Current radiation protection is a very sophisticated and elaborate domain where, once the information about the exposure of persons is known in terms of the quantity of the effective dose, we can predict resulting radiological consequences related to the stochastic risk to the health of the exposed persons without a need for other details. In fact, the effective dose contains all pertinent information including the average organ dose distribution and relevant radiation and tissue weighting factors which take into account the specific effects of different types of radiation and selected tissue radiosensitivity. Since the effective dose cannot be measured directly, one has to rely on the monitoring of other appropriate measurable quantities and then do some conversions. The current structure of radiation protection quantities includes too many quantities, the definitions of some of which are not easy to understand and interpret. Moreover, there are numerous quantities based on the dose equivalent, such as the equivalent dose, effective dose, committed equivalent dose, committed effective dose, collective equivalent dose, collective effective dose, personal dose equivalent, ambient dose equivalent and directional dose equivalent, where the only unit of Sv is used.. There are a number of cases in open literature reflecting the difficulties and mistakes in the use of radiation protection quantities. Even more complicated situations are encountered in the field, where the staff responsible for personal and workplace monitoring is confused because of so many different quantities and where the staff may not be qualified and experienced enough to be able to make the relevant conversions and interpretations. The paper summarizes our experience in teaching students and lecturing in various training courses addressing radiation protection where the primary task was to ensure that all radiation protection personnel understood the quantities and units used in radiation protection in the correct way consistent with their latest definitions and ICRP recommendations. (author)

  3. Parallel multigrid methods: implementation on message-passing computers and applications to fluid dynamics. A draft

    Solchenbach, K.; Thole, C.A.; Trottenberg, U.

    1987-01-01

    For a wide class of problems in scientific computing, in particular for partial differential equations, the multigrid principle has proved to yield highly efficient numerical methods. However, the principle has to be applied carefully: if the multigrid components are not chosen adequately with respect to the given problem, the efficiency may be much smaller than possible. This has been demonstrated for many practical problems. Unfortunately, the general theories on multigrid convergence do not give much help in constructing really efficient multigrid algorithms. Although some progress has been made in bridging the gap between theory and practice during the last few years, there are still several theoretical approaches which are misleading rather than helpful with respect to the objective of real efficiency. The research in finding highly efficient algorithms for non-model applications therefore is still a sophisticated mixture of theoretical considerations, a transfer of experiences from model to real life problems and systematical experimental work. The emphasis of the practical research activity today lies - among others - in the following fields: - finding efficient multigrid components for really complex problems, - combining the multigrid approach with advanced discretizative techniques: - constructing highly parallel multigrid algorithms. In this paper, we want to deal mainly with the last topic

  4. Education and training in radiation protection: a challenge in passing on a difficult and intricate message

    Sabol, Jozef; Hudzietzova, Jana; Rosina, Jozef

    2013-01-01

    Current radiation protection is a very sophisticated and elaborate domain where, once the information about the exposure of persons is known in terms of the quantity of the effective dose, we can predict resulting radiological consequences related to the stochastic risk to the health of the exposed persons without a need for other details. In fact, the effective dose contains all pertinent information including the average organ dose distribution and relevant radiation and tissue weighting factors which take into account the specific effects of different types of radiation and selected tissue radiosensitivity. Since the effective dose cannot be measured directly, one has to rely on the monitoring of other appropriate measurable quantities and then do some conversions. The current structure of radiation protection quantities includes too many quantities, the definitions of some of which are not easy to understand and interpret. Moreover, there are numerous quantities based on the dose equivalent, such as the equivalent dose, effective dose, committed equivalent dose, committed effective dose, collective equivalent dose, collective effective dose, personal dose equivalent, ambient dose equivalent and directional dose equivalent, where the only unit of Sv is used.. There are a number of cases in open literature reflecting the difficulties and mistakes in the use of radiation protection quantities. Even more complicated situations are encountered in the field, where the staff responsible for personal and workplace monitoring is confused because of so many different quantities and where the staff may not be qualified and experienced enough to be able to make the relevant conversions and interpretations. The paper summarizes our experience in teaching students and lecturing in various training courses addressing radiation protection where the primary task was to ensure that all radiation protection personnel understood the quantities and units used in radiation protection in the correct way consistent with their latest definitions and ICRP recommendations. (author)

  5. ICRF heating of passing ions in TMX-U

    Molvik, A.W.; Dimonte, G.; Barter, J.; Campbell, R.; Cummins, W.F.; Falabella, S.; Ferguson, S.W.; Poulsen, P.

    1986-04-01

    By placing ion-cyclotron resonant frequency (ICRF) antennas on both sides of a midplane gas-feed system in the central cell of the Tandem Mirror Experiment-Upgrade (TMX-U), our results have improved in the following areas: (a) The end losses out both ends show a factor of 3 to 4 increase in passing-ion temperatures and a factor of 2 to 3 decrease in passing-ion densities. (b) The passing-ion heating is consistent with Monte Carlo predictions. (c) The plasma density can be sustained by ICRF plus gas fueling as observed on other experiments

  6. Effect of passing vessels on a moored ship

    Lean, G H; Price, W A

    1977-11-01

    The effect of passing vessels on a moored ship was investigated by a series of model tests carried out at the Hydraulics Research Station for the Esso Petroleum Co. Ltd., transportation department in connection with their oil jetty at Milford Haven. A main conclusion was that the forces appeared to be due to the pressure gradients associated with the pattern of flow that accompanies the passing ship rather than with the wave system. Slack lines are to be avoided, and some relief in maximum line loads can be achieved by increasing the pretension. The results included the effects of passing vessel speed and ship clearance and draft.

  7. Patient-clinician mobile communication: analyzing text messaging between adolescents with asthma and nurse case managers.

    Yoo, Woohyun; Kim, Soo Yun; Hong, Yangsun; Chih, Ming-Yuan; Shah, Dhavan V; Gustafson, David H

    2015-01-01

    With the increasing penetration of digital mobile devices among adolescents, mobile texting messaging is emerging as a new channel for patient-clinician communication for this population. In particular, it can promote active communication between healthcare clinicians and adolescents with asthma. However, little is known about the content of the messages exchanged in medical encounters via mobile text messaging. Therefore, this study explored the content of text messaging between clinicians and adolescents with asthma. We collected a total of 2,953 text messages exchanged between 5 nurse case managers and 131 adolescents with asthma through a personal digital assistant. The text messages were coded using a scheme developed by adapting categories from the Roter Interaction Analysis System. Nurse case managers sent more text messages (n=2,639) than adolescents with asthma. Most messages sent by nurse case managers were targeted messages (n=2,475) directed at all adolescents with asthma, whereas there were relatively few tailored messages (n=164) that were created personally for an individual adolescent. In addition, both targeted and tailored messages emphasized task-focused behaviors over socioemotional behaviors. Likewise, text messages (n=314) sent by adolescents also emphasized task-focused over socioemotional behaviors. Mobile texting messaging has the potential to play an important role in patient-clinician communication. It promotes not only active interaction, but also patient-centered communication with clinicians. In order to achieve this potential, healthcare clinicians may need to focus on socioemotional communication as well as task-oriented communication.

  8. Message Correlation Analysis Tool for NOvA

    CERN. Geneva

    2012-01-01

    A complex running system, such as the NOvA online data acquisition, consists of a large number of distributed but closely interacting components. This paper describes a generic realtime correlation analysis and event identification engine, named Message Analyzer. Its purpose is to capture run time abnormalities and recognize system failures based on log messages from participating components. The initial design of analysis engine is driven by the DAQ of the NOvA experiment. The Message Analyzer performs filtering and pattern recognition on the log messages and reacts to system failures identified by associated triggering rules. The tool helps the system maintain a healthy running state and to minimize data corruption. This paper also describes a domain specific language that allows the recognition patterns and correlation rules to be specified in a clear and flexible way. In addition, the engine provides a plugin mechanism for users to implement specialized patterns or rules in generic languages such as C++.

  9. Message Correlation Analysis Tool for NOvA

    Lu Qiming; Biery, Kurt A; Kowalkowski, James B

    2012-01-01

    A complex running system, such as the NOvA online data acquisition, consists of a large number of distributed but closely interacting components. This paper describes a generic real-time correlation analysis and event identification engine, named Message Analyzer. Its purpose is to capture run time abnormalities and recognize system failures based on log messages from participating components. The initial design of analysis engine is driven by the data acquisition (DAQ) of the NOvA experiment. The Message Analyzer performs filtering and pattern recognition on the log messages and reacts to system failures identified by associated triggering rules. The tool helps the system maintain a healthy running state and to minimize data corruption. This paper also describes a domain specific language that allows the recognition patterns and correlation rules to be specified in a clear and flexible way. In addition, the engine provides a plugin mechanism for users to implement specialized patterns or rules in generic languages such as C++.

  10. Message correlation analysis tool for NOvA

    Lu, Qiming [Fermilab; Biery, Kurt A. [Fermilab; Kowalkowski, James B. [Fermilab

    2012-01-01

    A complex running system, such as the NOvA online data acquisition, consists of a large number of distributed but closely interacting components. This paper describes a generic real-time correlation analysis and event identification engine, named Message Analyzer. Its purpose is to capture run time abnormalities and recognize system failures based on log messages from participating components. The initial design of analysis engine is driven by the data acquisition (DAQ) of the NOvA experiment. The Message Analyzer performs filtering and pattern recognition on the log messages and reacts to system failures identified by associated triggering rules. The tool helps the system maintain a healthy running state and to minimize data corruption. This paper also describes a domain specific language that allows the recognition patterns and correlation rules to be specified in a clear and flexible way. In addition, the engine provides a plugin mechanism for users to implement specialized patterns or rules in generic languages such as C++.

  11. Magnetism of Minor Bodies in the Solar System: From 433 Eros, passing Braille, Steins, and Lutetia towards Churyumov-Gerasimenko and 1999 JU3.

    Hercik, David; Auster, Hans-Ulrich; Heinisch, Philip; Richter, Ingo; Glassmeier, Karl-Heinz

    2015-04-01

    Minor bodies in the solar system, such as asteroids and comets, are important sources of information for our knowledge of the solar system formation. Besides other aspects, estimation of a magnetization state of such bodies might prove important in understanding the early aggregation phases of the protoplanetary disk, showing the level of importance of the magnetic forces in the processes involved. Meteorites' magnetization measurements suggest that primitive bodies consist of magnetized material. However, space observations from various flybys give to date diverse results for a global magnetization estimation. The flybys at Braille and Gaspra indicate possible higher magnetization (~ 10-3 Am2/kg), while flybys at Steins and Lutetia show no significant values in the global field change illustrating low global magnetization. Furthermore, the interpretation of remote (during flybys) measurements is very difficult. For correct estimates on the local magnetization one needs (in the best case) multi-point surface measurements. Single point observation has been done by NEAR-Shoemaker on 433 Eros asteroid, revealing no signature in magnetic field that could have origin in asteroid magnetization. Similar results, no magnetization observed, have been provided by evaluation of recent data from ROMAP (Philae lander) and RPC-MAG (Rosetta orbiter) instruments from comet 67P/Churyumov-Gerasimenko. The ROMAP instrument provided measurements from multiple points of the cometary surface as well as data along ballistic path between multiple touchdowns, which support the conclusion of no global magnetization. However, even in case of the in-situ on surface observations the magnetization estimate has a limiting spatial resolution that is dependent on the distance from the surface (~ 50 cm in case of ROMAP). To get information about possible smaller magnetized grains distribution and magnetization strength, the sensor shall be placed as close as possible to the surface. For such

  12. Infection tracers: past, present and future; Radiotraceurs et recherche d'infection du systeme musculo-squelettique: passe, present et futur

    Turpin MD, S. [Centre Hospitalier Universitaire, Hotel Dieu de Montreal, Dept. de Medecine Nucleaire, Quebec (Canada)

    2006-06-15

    Clinical and para-clinical findings are still the mainstay for the diagnosis of musculoskeletal infections, especially osteomyelitis. No single complementary imaging technique has 100% specificity and sensitivity for every case of musculoskeletal infection. Depending on the age of the patient, presence of orthopedic hardware, location of infection, underlying bone and systemic conditions, the choice of imaging modalities must be tailored to the patient's condition. Plain radiographs are performed first and may be sufficient. In children, bone scan is highly accurate to diagnose osteomyelitis. Labeled leukocytes with complementary bone or bone marrow studies are recommended for orthopedic hardware or diabetic foot. Finally, gallium scanning is useful for the diagnosis of vertebral osteomyelitis. Current radiopharmaceuticals used for diagnosing infection also label inflammation, which limits specificity. Newer products, as Infecton and {sup 18}F-FDG, are currently under investigation for the differentiation between infection and sterile inflammation. (author)

  13. GPS Ephemeris Message Broadcast Simulation

    Browne, Nathan J; Light, James J

    2005-01-01

    The warfighter constantly needs increased accuracy from GPS and a means to increasing this accuracy to the decimeter level is a broadcast ephemeris message containing GPS satellite orbit and clock corrections...

  14. Triplets pass their pressure test

    2007-01-01

    All the LHC inner triplets have now been repaired and are in position. The first ones have passed their pressure tests with flying colours. The repaired inner triplet at LHC Point 1, right side (1R). Ranko Ostojic (on the right), who headed the team responsible for repairing the triplets, shows the magnet to Robert Zimmer, President of the University of Chicago and of Fermi Research Alliance, who visited CERN on 20th August.Three cheers for the triplets! All the LHC inner triplets have now been repaired and are in position in the tunnel. Thanks to the mobilisation of a multidisciplinary team from CERN and Fermilab, assisted by the KEK Laboratory and the Lawrence Berkeley National Laboratory (LBNL), a solution has been found, tested, validated and applied. At the end of March this year, one of the inner triplets at Point 5 failed to withstand a pressure test. A fault was identified in the supports of two out of the three quadruple magne...

  15. NUClear: A Loosely Coupled Software Architecture for Humanoid Robot Systems

    Trent eHouliston

    2016-04-01

    Full Text Available This paper discusses the design and interface of NUClear, a new hybrid message-passing architecture for embodied humanoid robotics. NUClear is modular, low latency and promotes functional and expandable software design. It greatly reduces the latency for messages passed between modules as the messages routes are established at compile time. It also reduces the number of functions that must be written using a system called co-messages which aids in dealing with multiple simultaneous data. NUClear has primarily been evaluated on a humanoid robotic soccer platform and on a robotic boat platform, with evaluations showing that NUClear requires fewer callbacks and cache variables over existing message-passing architectures. NUClear does have limitations when applying these techniques on multi-processed systems. It performs best in lower power systems where computational resources are limited. Future work will focus on applying the architecture to new platforms, including a larger form humanoid platform and a virtual reality platform and further evaluating the impact of the novel techniques introduced.

  16. Precision Assembly of Systems on Surfaces (PASS)

    2015-02-06

    incompatible with deposition on plastic substrates. Additionally, the metal oxide structure is one that is brittle and cracks can be generated with low...of and between gold electrodes (1 mm gap) on six different substrates (PMMA, weighing paper, silicon wafer, glass, adhesive tape, and alumina) by

  17. Mobile text messaging solutions for obesity prevention

    Akopian, David; Jayaram, Varun; Aaleswara, Lakshmipathi; Esfahanian, Moosa; Mojica, Cynthia; Parra-Medina, Deborah; Kaghyan, Sahak

    2011-02-01

    Cellular telephony has become a bright example of co-evolution of human society and information technology. This trend has also been reflected in health care and health promotion projects which included cell phones in data collection and communication chain. While many successful projects have been realized, the review of phone-based data collection techniques reveals that the existing technologies do not completely address health promotion research needs. The paper presents approaches which close this gap by extending existing versatile platforms. The messaging systems are designed for a health-promotion research to prevent obesity and obesity-related health disparities among low-income Latino adolescent girls. Messaging and polling mechanisms are used to communicate and automatically process response data for the target constituency. Preliminary survey data provide an insight on phone availability and technology perception for the study group.

  18. Field Test of Slow Moving Traffic Alerting System on Freeways in Las Vegas, Nevada : Assessment of the Effectiveness of the Dynamic Message Signs on the Freeways in Las Vegas, Nevada.

    2015-10-17

    It has been perceived that the travelers do not respond to the incident messages on the dynamic message signs in the Las Vegas area in Nevada. The objective of the study is to evaluate whether dynamic message signs (DMS) in the Las Vegas freeway syst...

  19. Perancangan dan Implementasi Sistem Informasi Layanan Short Messaging Service (SMS)

    Rossy W, Cahyo; Wellem, Theophilus; Utomo, Wiranto Herry

    2006-01-01

    Development progress of Communication technology increase in a line with the people demand of the technology, such as Wireless communication technology, especially, Global System for Mobile Communication (GSM), which known as a digital mobile phone. Mobile phone used to send and receive short message in GSM network known as Short Messaging Service (SMS), besides communicate with another person by voice. In recent years, SMS is not just used for text-based communication tool between mobile pho...

  20. Reactions to threatening health messages.

    Ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; Köhninger, Constanze; Kölgen, Lizan; Pelssers, Isabelle; Schütt, Toby; Thomas, Sophia; Ruiter, Robert A C; Kok, Gerjo

    2012-11-21

    Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93). Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72). Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  1. Delay Bound: Fractal Traffic Passes through Network Servers

    Ming Li

    2013-01-01

    Full Text Available Delay analysis plays a role in real-time systems in computer communication networks. This paper gives our results in the aspect of delay analysis of fractal traffic passing through servers. There are three contributions presented in this paper. First, we will explain the reasons why conventional theory of queuing systems ceases in the general sense when arrival traffic is fractal. Then, we will propose a concise method of delay computation for hard real-time systems as shown in this paper. Finally, the delay computation of fractal traffic passing through severs is presented.

  2. Oil price pass-through into inflation

    Chen, Shiu-Sheng

    2009-01-01

    This paper uses data from 19 industrialized countries to investigate oil price pass-through into inflation across countries and over time. A time-varying pass-through coefficient is estimated and the determinants of the recent declining effects of oil shocks on inflation are investigated. The appreciation of the domestic currency, a more active monetary policy in response to inflation, and a higher degree of trade openness are found to explain the decline in oil price pass-through. (author)

  3. Validation of the one pass measure for motivational interviewing competence.

    McMaster, Fiona; Resnicow, Ken

    2015-04-01

    This paper examines the psychometric properties of the OnePass coding system: a new, user-friendly tool for evaluating practitioner competence in motivational interviewing (MI). We provide data on reliability and validity with the current gold-standard: Motivational Interviewing Treatment Integrity tool (MITI). We compared scores from 27 videotaped MI sessions performed by student counselors trained in MI and simulated patients using both OnePass and MITI, with three different raters for each tool. Reliability was estimated using intra-class coefficients (ICCs), and validity was assessed using Pearson's r. OnePass had high levels of inter-rater reliability with 19/23 items found from substantial to almost perfect agreement. Taking the pair of scores with the highest inter-rater reliability on the MITI, the concurrent validity between the two measures ranged from moderate to high. Validity was highest for evocation, autonomy, direction and empathy. OnePass appears to have good inter-rater reliability while capturing similar dimensions of MI as the MITI. Despite the moderate concurrent validity with the MITI, the OnePass shows promise in evaluating both traditional and novel interpretations of MI. OnePass may be a useful tool for developing and improving practitioner competence in MI where access to MITI coders is limited. Copyright © 2015. Published by Elsevier Ireland Ltd.

  4. Photoacoustic Soot Spectrometer (PASS) Instrument Handbook

    Dubey, M [Los Alamos National Laboratory; Springston, S [Brookhaven National Laboratory; Koontz, A [Pacific Northwest National Laboratory; Aiken, A [Los Alamos National Laboratory

    2013-01-17

    The photoacoustic soot spectrometer (PASS) measures light absorption by aerosol particles. As the particles pass through a laser beam, the absorbed energy heats the particles and in turn the surrounding air, which sets off a pressure wave that can be detected by a microphone. The PASS instruments deployed by ARM can also simultaneously measure the scattered laser light at three wavelengths and therefore provide a direct measure of the single-scattering albedo. The Operator Manual for the PASS-3100 is included here with the permission of Droplet Measurement Technologies, the instrument’s manufacturer.

  5. Possibilities of the fish pass restoration

    Čubanová, Lea

    2018-03-01

    According to the new elaborated methodology of the Ministry of Environment of the Slovak Republic: Identification of the appropriate fish pass types according to water body typology (2015) each barrier on the river must be passable. On the barriers or structures without fish passes new ones should be design and built and on some water structures with existed but nonfunctional fish passes must be realized reconstruction or restoration of such objects. Assessment should be done in terms of the existing migratory fish fauna and hydraulic conditions. Fish fauna requirements resulting from the ichthyological research of the river section with barrier. Hydraulic conditions must than fulfil these requirements inside the fish pass body.

  6. Encoding and decoding messages with chaotic lasers

    Alsing, P.M.; Gavrielides, A.; Kovanis, V.; Roy, R.; Thornburg, K.S. Jr.

    1997-01-01

    We investigate the structure of the strange attractor of a chaotic loss-modulated solid-state laser utilizing return maps based on a combination of intensity maxima and interspike intervals, as opposed to those utilizing Poincare sections defined by the intensity maxima of the laser (I=0,Ie<0) alone. We find both experimentally and numerically that a simple, intrinsic relationship exists between an intensity maximum and the pair of preceding and succeeding interspike intervals. In addition, we numerically investigate encoding messages on the output of a chaotic transmitter laser and its subsequent decoding by a similar receiver laser. By exploiting the relationship between the intensity maxima and the interspike intervals, we demonstrate that the method utilized to encode the message is vital to the system close-quote s ability to hide the signal from unwanted deciphering. In this work alternative methods are studied in order to encode messages by modulating the magnitude of pumping of the transmitter laser and also by driving its loss modulation with more than one frequency. copyright 1997 The American Physical Society

  7. ZeroMQ messaging for many applications

    Hintjens, Pieter

    2013-01-01

    Dive into ØMQ (aka ZeroMQ), the smart socket library that gives you fast, easy, message-based concurrency for your applications. With this quick-paced guide, you’ll learn hands-on how to use this scalable, lightweight, and highly flexible networking tool for exchanging messages among clusters, the cloud, and other multi-system environments. ØMQ maintainer Pieter Hintjens takes you on a tour of real-world applications, using extended examples in C to help you work with ØMQ’s API, sockets, and patterns. Learn how to use specific ØMQ programming techniques, build multithreaded applications, and create your own messaging architectures. You’ll discover how ØMQ works with several programming languages and most operating systems—with little or no cost. Learn ØMQ’s main patterns: request-reply, publish-subscribe, and pipeline Work with ØMQ sockets and patterns by building several small applications Explore advanced uses of ØMQ’s request-reply pattern through working examples Build reliable request...

  8. ZeroMQ: Messaging Made Simple

    CERN. Geneva

    2013-01-01

    Since its inception in 2007, ZeroMQ has defined a new product category of thin, fast, open source message transports. This little library has now grown into a large, vibrant community of projects tied together with standard protocols and APIs. Applications, written in any language, talk to each other over TCP, multicast, or inproc transports, using a single socket-based API, and a set of "patterns" (pub-sub, request-reply, dealer-router, pipeline). ZeroMQ handles message framing, batching, and I/O, but ignores aspects like serialization and persistence. By focussing on the essentials, and acting as a toolkit rather than a pre-packaged solution, ZeroMQ turns the complex problem of distributed computing into a relatively simple recipe. About the speaker Pieter Hintjens is a writer, programmer, and public speaker who has spent decades building large software systems, organizations, and businesses. He designed the Advanced Message Queuing Protocol (AMQP) in 2006 for JPMorganChase and left ...

  9. Regenerative beam breakup in multi-pass electron accelerators

    Vetter, A.M. Jr.

    1980-01-01

    Important electron coincidence experiments in the 1 to 2 GeV range require electron beams of high intensity and high duty factor. To provide such beams, multi-pass electron accelerator systems are being developed at many laboratories. The beam current in multi-pass electron machines is limited by bean breakup which arises from interaction of the electron beam with deflection modes of the accelerator structure. Achieving high beam intensity (50 to 100 μA) will require detailed understanding and careful control of beam breakup phenomena, and is the subject of this thesis. The TM 11 -like traveling wave theory is applied to obtain a physical understanding of beam-mode interactions and the principles of focussing in simple two-pass systems, and is used as a basis for general studies of the dependence of starting current on accelerator parameters in systems of many passes. The concepts developed are applied in analyzing beam breakup in the superconducting recyclotron at Stanford. Measurements of beam interactions with selected breakup modes are incorporated in a simple model in order to estimate relative strengths of breakup modes and to predict starting currents in five-pass operation. The improvement over these predicted currents required in order to obtain 50 to 100 μA beams is shown to be achievable with a combination of increased breakup mode loading and improved beam optics

  10. Message network simulation

    Shih, Kuo-Tung

    1990-01-01

    Approved for public release, distribution is unlimited This thesis presents a computer simulation of a multinode data communication network using a virtual network model to determine the effects of various system parameters on overall network performance. Lieutenant Commander, Republic of China (Taiwan) Navy

  11. Radiating Messages: An International Perspective.

    Walker, Janet

    2003-01-01

    Negative messages about the detrimental impacts of divorce on children prompted urgent calls in the United Kingdom for a reinstatement of traditional family values. Suggests that although the effects of divorce are real, care should be taken to avoid exaggeration, thus moving the debate to one centered on providing better support, advice, and…

  12. Re: Design Changing the Message

    Wall, Miranda Wakeman

    2008-01-01

    The advertisements that flood everyone's visual culture are designed to create desire. From the author's experience, most high school students are not aware of the messages that they are bombarded with every day, and if they are, few care or think about them critically. The author's goals for this lesson were to increase students' awareness of the…

  13. Instant Apache Camel message routing

    Ibryam, Bilgin

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This short, instruction-based guide shows you how to perform application integration using the industry standard Enterprise Integration Patterns.This book is intended for Java developers who are new to Apache Camel and message- oriented applications.

  14. The Media and the Message.

    Cook, Glenn

    2001-01-01

    The experiences of Columbine and El Cajon high schools with media onslaughts following traumatic shooting incidents underscore the importance of getting the message across and sticking to known facts. In a crisis, speculation can hurt everyone. The most important elements in crisis communications are planning and media relations. (MLH)

  15. Spatial variation in messaging effects

    Warshaw, Christopher

    2018-05-01

    There is large geographic variation in the public's views about climate change in the United States. Research now shows that climate messages can influence public beliefs about the scientific consensus on climate change, particularly in the places that are initially more skeptical.

  16. Mobile phone messaging for preventive health care.

    Vodopivec-Jamsek, Vlasta; de Jongh, Thyra; Gurol-Urganci, Ipek; Atun, Rifat; Car, Josip

    2012-12-12

    Preventive health care promotes health and prevents disease or injuries by addressing factors that lead to the onset of a disease, and by detecting latent conditions to reduce or halt their progression. Many risk factors for costly and disabling conditions (such as cardiovascular diseases, cancer, diabetes, and chronic respiratory diseases) can be prevented, yet healthcare systems do not make the best use of their available resources to support this process. Mobile phone messaging applications, such as Short Message Service (SMS) and Multimedia Message Service (MMS), could offer a convenient and cost-effective way to support desirable health behaviours for preventive health care. To assess the effects of mobile phone messaging interventions as a mode of delivery for preventive health care, on health status and health behaviour outcomes. We searched: the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library 2009, Issue 2), MEDLINE (OvidSP) (January 1993 to June 2009), EMBASE (OvidSP) (January 1993 to June 2009), PsycINFO (OvidSP) (January 1993 to June 2009), CINAHL (EbscoHOST) (January 1993 to June 2009), LILACS (January 1993 to June 2009) and African Health Anthology (January 1993 to June 2009).We also reviewed grey literature (including trial registers) and reference lists of articles. We included randomised controlled trials (RCTs), quasi-randomised controlled trials (QRCTs), controlled before-after (CBA) studies, and interrupted time series (ITS) studies with at least three time points before and after the intervention. We included studies using SMS or MMS as a mode of delivery for any type of preventive health care. We only included studies in which it was possible to assess the effects of mobile phone messaging independent of other technologies or interventions. Two review authors independently assessed all studies against the inclusion criteria, with any disagreements resolved by a third review author. Study design features

  17. Reactions to threatening health messages

    ten Hoor Gill A

    2012-11-01

    Full Text Available Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. Methods We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93. Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72. Results Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. Conclusions These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  18. Representing culture in interstellar messages

    Vakoch, Douglas A.

    2008-09-01

    As scholars involved with the Search for Extraterrestrial Intelligence (SETI) have contemplated how we might portray humankind in any messages sent to civilizations beyond Earth, one of the challenges they face is adequately representing the diversity of human cultures. For example, in a 2003 workshop in Paris sponsored by the SETI Institute, the International Academy of Astronautics (IAA) SETI Permanent Study Group, the International Society for the Arts, Sciences and Technology (ISAST), and the John Templeton Foundation, a varied group of artists, scientists, and scholars from the humanities considered how to encode notions of altruism in interstellar messages . Though the group represented 10 countries, most were from Europe and North America, leading to the group's recommendation that subsequent discussions on the topic should include more globally representative perspectives. As a result, the IAA Study Group on Interstellar Message Construction and the SETI Institute sponsored a follow-up workshop in Santa Fe, New Mexico, USA in February 2005. The Santa Fe workshop brought together scholars from a range of disciplines including anthropology, archaeology, chemistry, communication science, philosophy, and psychology. Participants included scholars familiar with interstellar message design as well as specialists in cross-cultural research who had participated in the Symposium on Altruism in Cross-cultural Perspective, held just prior to the workshop during the annual conference of the Society for Cross-cultural Research . The workshop included discussion of how cultural understandings of altruism can complement and critique the more biologically based models of altruism proposed for interstellar messages at the 2003 Paris workshop. This paper, written by the chair of both the Paris and Santa Fe workshops, will explore the challenges of communicating concepts of altruism that draw on both biological and cultural models.

  19. Lightning activity and radar observations of the multicell thunderstorm system passing over Swider Observatory (Poland) on 19 July 2015 and its dynamic and electric charge structure obtained from the WRF_ELEC model

    Kubicki, Marek; Konarski, Jerzy; Gajda, Wojciech; Barański, Piotr; Guzikowski, Jakub; Kryza, Maciej

    2017-04-01

    In this work we present preliminary results on the thunderstorm event at IG PAS Swider Geophysical Observatory (52.12°N, 21.25°E, geomagnetic latitude 50.5°N, near Warsaw, Poland) on 19 July 2015. The storm was caused by the abrasion of the warm front that stretched almost latitudinaly and cold front moving from the west to the east. Warm continental-tropical arrived at southern and eastern part of the country and the rest was covered by cool polar-maritime airmass. The storm had the squall-line character of approximately 100 km length and consisted of several cells, and the height of the cumulonimbus (Cb) cloud base was 1 km and top was 14 km, as inferred from the analysis of CAPPI (Constant Altitude Plan Position Indicator), CMAX (Column Maximum Display), MLVCUT (Multiple-Line Vertical Cut) radar map products from POLRAD observations at Institute of Meteorology and Water Management - National Research Institute (IMWM-NRI), Legionowo station. In our paper we have discussed the obtained results of the post-time analysis of lightning activity and radar observations of the extended multicells thunderstorm system passing over IG PAS Swider Geophysical Observatory, on 19 July 2015 together with its dynamic and electric charge structure obtained from the WRF_ELEC model. We have used the archive data from the Polish National Lightning Location and Detection System PERUN (provided by IMWM-NRI) together with radar data obtained from the Doppler meteorological radar METEOR 1500C at Legionowo. Additionally, during the approach, passing over and moving away phase of the thunderstorm system, we have gathered the simultaneous and continuous recordings of E-field, the electric conductivity of air and the independent supplementary reference lightning detections delivered by the Swider measuring station of the Local Lightning Detection Network (LLDN) operated in Warsaw region. These data have given us a new possibility to acquire many valuable information about the

  20. Toward Predicting Popularity of Social Marketing Messages

    Yu, Bei; Chen, Miao; Kwok, Linchi

    Popularity of social marketing messages indicates the effectiveness of the corresponding marketing strategies. This research aims to discover the characteristics of social marketing messages that contribute to different level of popularity. Using messages posted by a sample of restaurants on Facebook as a case study, we measured the message popularity by the number of "likes" voted by fans, and examined the relationship between the message popularity and two properties of the messages: (1) content, and (2) media type. Combining a number of text mining and statistics methods, we have discovered some interesting patterns correlated to "more popular" and "less popular" social marketing messages. This work lays foundation for building computational models to predict the popularity of social marketing messages in the future.

  1. Astor Pass Seismic Surveys Preliminary Report

    Louie, John [UNR; Pullammanappallil, Satish [Optim; Faulds, James; Eisses, Amy; Kell, Annie; Frary, Roxanna; Kent, Graham

    2011-08-05

    In collaboration with the Pyramid Lake Paiute Tribe (PLPT), the University of Nevada, Reno (UNR) and Optim re-processed, or collected and processed, over 24 miles of 2d seismic-reflection data near the northwest corner of Pyramid Lake, Nevada. The network of 2d land surveys achieved a near-3d density at the Astor Pass geothermal prospect that the PLPT drilled during Nov. 2010 to Feb. 2011. The Bureau of Indian Affairs funded additional seismic work around the Lake, and an extensive, detailed single-channel marine survey producing more than 300 miles of section, imaging more than 120 ft below the Lake bottom. Optim’s land data collection utilized multiple heavy vibrators and recorded over 200 channels live, providing a state-of-the-art reflection-refraction data set. After advanced seismic analysis including first-arrival velocity optimization and prestack depth migration, the 2d sections show clear fault-plane reflections, in some areas as deep as 4000 ft, tying to distinct terminations of the mostly volcanic stratigraphy. Some lines achieved velocity control to 3000 ft depth; all lines show reflections and terminations to 5000 ft depth. Three separate sets of normal faults appear in an initial interpretation of fault reflections and stratigraphic terminations, after loading the data into the OpendTect 3d seismic visualization system. Each preliminary fault set includes a continuous trace more than 3000 ft long, and a swarm of short fault strands. The three preliminary normal-fault sets strike northerly with westward dip, northwesterly with northeast dip, and easterly with north dip. An intersection of all three fault systems documented in the seismic sections at the end of Phase I helped to locate the APS-2 and APS-3 slimholes. The seismic sections do not show the faults connected to the Astor Pass tufa spire, suggesting that we have imaged mostly Tertiary-aged faults. We hypothesize that the Recent, active faults that produced the tufa through hotspring

  2. TMN-based network management systems for utility telecommunication network. Pt. 4. Method of estimation of processing time for a management function; ATM ni motozuku denryoku tsushinmo no un`yo kanri system. 4. Kanri kino tani no shori jikan suitei hoho

    Yusa, H.; Otani, T.

    1998-05-01

    A method of estimation of processing time for a management function is proposed to test system performance. This method utilizes characteristics of message passing between managed objects to recognize all over the systems. Estimation of processing time is proceeded with following steps. (1) analysis of message flow: with design information, message patterns are set and the number of messages to be sended and received are counted. (2) measuring processing time of each message type: we developed programs to measure processing time of sending and receiving messages. Using this programs, message processing time for each message type is measured. (3) calculating total system processing time: managing system processing time and managed system processing time are calculated. Total system processing time is derived from those. This paper also shows the applying proposed method to SDH fault detection function, which have two different processes: all event process, event and log process. This resulted in 2:1 processing time on a case of fiber cut off for managing two SDH equipments. (author)

  3. Improving Type Error Messages in OCaml

    Charguéraud , Arthur

    2015-01-01

    International audience; Cryptic type error messages are a major obstacle to learning OCaml or other ML-based languages. In many cases, error messages cannot be interpreted without a sufficiently-precise model of the type inference algorithm. The problem of improving type error messages in ML has received quite a bit of attention over the past two decades, and many different strategies have been considered. The challenge is not only to produce error messages that are both sufficiently concise ...

  4. A prototype for the PASS Permanent All Sky Survey

    Deeg, H. J.; Alonso, R.; Belmonte, J. A.; Horne, K.; Alsubai, K.; Collier Cameron, A.; Doyle, L. R.

    2004-10-01

    A prototype system for the Permanent All Sky Survey (PASS) project is presented. PASS is a continuous photometric survey of the entire celestial sphere with a high temporal resolution. Its major objectives are the detection of all giant-planet transits (with periods up to some weeks) across stars up to mag 10.5, and to deliver continuously photometry that is useful for the study of any variable stars. The prototype is based on CCD cameras with short focal length optics on a fixed mount. A small dome to house it at Teide Observatory, Tenerife, is currently being constructed. A placement at the antarctic Dome C is also being considered. The prototype will be used for a feasibility study of PASS, to define the best observing strategies, and to perform a detailed characterization of the capabilities and scope of the survey. Afterwards, a first partial sky surveying will be started with it. That first survey may be able to detect transiting planets during its first few hundred hours of operation. It will also deliver a data set around which software modules dealing with the various scientific objectives of PASS will be developed. The PASS project is still in its early phase and teams interested in specific scientific objectives, in providing technical expertise, or in participating with own observations are invited to collaborate.

  5. A double-pass interferometer for measurement of dimensional changes

    Ren, Dongmei; Lawton, K M; Miller, J A

    2008-01-01

    A double-pass interferometer was developed for measuring dimensional changes of materials in a nanoscale absolute interferometric dilatometer. This interferometer realized the double-ended measurement of a sample using a single-detection double-pass interference system. The nearly balanced design, in which the measurement beam and the reference beam have equal optical path lengths except for the path difference caused by the sample itself, makes this interferometer have high stability, which is verified by the measurement of a quasi-zero-length sample. The preliminary experiments and uncertainty analysis show that this interferometer should be able to measure dimensional changes with characteristic uncertainty at the nanometer level

  6. 78 FR 52166 - Quantitative Messaging Research

    2013-08-22

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast-track OMB approval... message testing research (for which CFTC received fast-track OMB approval) and is necessary to identify...

  7. Effects of Text Messaging on Academic Performance

    Barks Amanda; Searight H. Russell; Ratwik Susan

    2011-01-01

    University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were ...

  8. Message exchange in the building industry

    Vries, de B.; Somers, L.J.A.M.

    1995-01-01

    A process model is described for exchanging information in the building industry. In this model participants send and receive messages. On receipt of a message an activity is executed if all required information is available. Otherwise a message will be sent to another participant to obtain the

  9. How to pass higher English colour

    Bridges, Ann

    2009-01-01

    How to Pass is the Number 1 revision series for Scottish qualifications across the three examination levels of Standard Grade, Intermediate and Higher! Second editions of the books present all of the material in full colour for the first time.

  10. Framing of health information messages.

    Akl, Elie A; Oxman, Andrew D; Herrin, Jeph; Vist, Gunn E; Terrenato, Irene; Sperati, Francesca; Costiniuk, Cecilia; Blank, Diana; Schünemann, Holger

    2011-12-07

    -planned subgroup analyses based on the type of message (screening, prevention, and treatment). The primary outcome was behaviour. We did not assess any adverse outcomes. We included 35 studies involving 16,342 participants (all health consumers) and reporting 51 comparisons.In the context of attribute framing, participants in one included study understood the message better when it was framed negatively than when it was framed positively (1 study; SMD -0.58 (95% confidence interval (CI) -0.94 to -0.22); moderate effect size; low quality evidence). Although positively-framed messages may have led to more positive perception of effectiveness than negatively-framed messages (2 studies; SMD 0.36 (95% CI -0.13 to 0.85); small effect size; low quality evidence), there was little or no difference in persuasiveness (11 studies; SMD 0.07 (95% CI -0.23 to 0.37); low quality evidence) and behavior (1 study; SMD 0.09 (95% CI -0.14 to 0.31); moderate quality evidence).In the context of goal framing, loss messages led to a more positive perception of effectiveness compared to gain messages for screening messages (5 studies; SMD -0.30 (95% CI -0.49 to -0.10); small effect size; moderate quality evidence) and may have been more persuasive for treatment messages (3 studies; SMD -0.50 (95% CI -1.04 to 0.04); moderate effect size; very low quality evidence). There was little or no difference in behavior (16 studies; SMD -0.06 (95% CI -0.15 to 0.03); low quality evidence). No study assessed the effect on understanding. Contrary to commonly held beliefs, the available low to moderate quality evidence suggests that both attribute and goal framing may have little if any consistent effect on health consumers' behaviour. The unexplained heterogeneity between studies suggests the possibility of a framing effect under specific conditions. Future research needs to investigate these conditions.

  11. Reactions to threatening health messages

    ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; K?hninger, Constanze; K?lgen, Lizan; Pelssers, Isabelle; Sch?tt, Toby; Thomas, Sophia; Ruiter, Robert AC; Kok, Gerjo

    2012-01-01

    Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence th...

  12. Instant Messaging in Dental Education.

    Khatoon, Binish; Hill, Kirsty B; Walmsley, A Damien

    2015-12-01

    Instant messaging (IM) is when users communicate instantly via their mobile devices, and it has become one of the most preferred choices of tools to communicate amongst health professions students. The aim of this study was to understand how dental students communicate via IM, faculty members' perspectives on using IM to communicate with students, and whether such tools are useful in the learning environment. After free-associating themes on online communication, two draft topic guides for structured interviews were designed that focussed on mobile device-related communication activities. A total of 20 students and six faculty members at the University of Birmingham School of Dentistry agreed to take part in the interviews. Students were selected from years 1-5 representing each year group. The most preferred communication tools were emails, social networking, and IM. Emails were used for more formal messages, and IM and social networking sites were used for shorter messages. WhatsApp was the most used IM app because of its popular features such as being able to check if recipients have read and received messages and group work. The students reported that changes were necessary to improve their communication with faculty members. The faculty members reported having mixed feelings toward the use of IM to communicate with students. The students wished to make such tools a permanent part of their learning environment, but only with the approval of faculty members. The faculty members were willing to accept IM as a communication tool only if it is monitored and maintained by the university and has a positive effect on learning.

  13. Anon-Pass: Practical Anonymous Subscriptions.

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch . Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user.

  14. Distributed Programming via Safe Closure Passing

    Philipp Haller

    2016-02-01

    Full Text Available Programming systems incorporating aspects of functional programming, e.g., higher-order functions, are becoming increasingly popular for large-scale distributed programming. New frameworks such as Apache Spark leverage functional techniques to provide high-level, declarative APIs for in-memory data analytics, often outperforming traditional "big data" frameworks like Hadoop MapReduce. However, widely-used programming models remain rather ad-hoc; aspects such as implementation trade-offs, static typing, and semantics are not yet well-understood. We present a new asynchronous programming model that has at its core several principles facilitating functional processing of distributed data. The emphasis of our model is on simplicity, performance, and expressiveness. The primary means of communication is by passing functions (closures to distributed, immutable data. To ensure safe and efficient distribution of closures, our model leverages both syntactic and type-based restrictions. We report on a prototype implementation in Scala. Finally, we present preliminary experimental results evaluating the performance impact of a static, type-based optimization of serialization.

  15. Designing mobile instant messaging for collaborative health data management in Rwanda

    Fraschetti, Yrjan Aleksander Frøyland

    2017-01-01

    Fast and efficient communication is crucial for workers that are required to collaborate. Instant messaging has been found to be more efficient than email and other asynchronous messaging systems when used for asking quick questions. Group chats have also been shown to stimulate collaboration between multiple users. In this thesis, we explore how mobile instant messaging can facilitate and stimulate collaboration between health data managers working in different facilities in Rwanda. An insta...

  16. Archiving AIS messages in a Geo-DBMS

    Meijers, B.M.; Quak, C.W.; van Oosterom, P.J.M.; Bregt, Arnold; Sarjakoski, Tapani; Lammeren, Ron van; Rip, Frans

    2017-01-01

    This paper reports on the result of two studies for using a geographical database management system for archiving Automated Identification System (AIS) message data. In this paper, we analyse the storage (using MongoDB and PostgreSQL) and we give a more in-depth description of a possible data model

  17. Entity-based Classification of Twitter Messages

    Yerva, Surender Reddy; Miklós, Zoltán; Aberer, Karl

    2012-01-01

    Twitter is a popular micro-blogging service on theWeb, where people can enter short messages, which then become visible to some other users of the service. While the topics of these messages varies, there are a lot of messages where the users express their opinions about some companies or their products. These messages are a rich source of information for companies for sentiment analysis or opinion mining. There is however a great obstacle for analyzing the messages directly: as the company n...

  18. Two-way text messaging: an interactive mobile learning environment in higher education

    H.K. Salinda Premadasa

    2016-11-01

    Full Text Available Short messaging service (SMS is perhaps the most popular mobile technology prevalent among students in higher education due to its ubiquitous nature and the capability of two-way communication. However, a major limitation in two-way text messaging is sending back a part of received data with the reply message. This limitation results in users of a mobile learning environment being unable to reply back to the correct destination. This article presents a two-way text messaging system that can be integrated into a learning management system (LMS to provide an interactive learning experience to the user community. Initially, a database is integrated into the LMS that holds message information such as recipient's phone number, message body and user data header. A specific port associated with the SMS is used to conceal and exchange data of a particular course unit. Subsequently, software in the student's mobile device captures this message and sends back the reply message to the appropriate course unit allowing both teachers and students to view messages sent and replies received pertaining to a particular course. Results indicate the educational impact of the proposed system in improving the learning environment and benefits it offers to the community in a campus-wide implementation.

  19. Tailored motivational message generation: A model and practical framework for real-time physical activity coaching.

    Op den Akker, Harm; Cabrita, Miriam; Op den Akker, Rieks; Jones, Valerie M; Hermens, Hermie J

    2015-06-01

    This paper presents a comprehensive and practical framework for automatic generation of real-time tailored messages in behavior change applications. Basic aspects of motivational messages are time, intention, content and presentation. Tailoring of messages to the individual user may involve all aspects of communication. A linear modular system is presented for generating such messages. It is explained how properties of user and context are taken into account in each of the modules of the system and how they affect the linguistic presentation of the generated messages. The model of motivational messages presented is based on an analysis of existing literature as well as the analysis of a corpus of motivational messages used in previous studies. The model extends existing 'ontology-based' approaches to message generation for real-time coaching systems found in the literature. Practical examples are given on how simple tailoring rules can be implemented throughout the various stages of the framework. Such examples can guide further research by clarifying what it means to use e.g. user targeting to tailor a message. As primary example we look at the issue of promoting daily physical activity. Future work is pointed out in applying the present model and framework, defining efficient ways of evaluating individual tailoring components, and improving effectiveness through the creation of accurate and complete user- and context models. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. Patient–Clinician Mobile Communication: Analyzing Text Messaging Between Adolescents with Asthma and Nurse Case Managers

    Kim, Soo Yun; Hong, Yangsun; Chih, Ming-Yuan; Shah, Dhavan V.; Gustafson, David H.

    2015-01-01

    Abstract Background: With the increasing penetration of digital mobile devices among adolescents, mobile texting messaging is emerging as a new channel for patient–clinician communication for this population. In particular, it can promote active communication between healthcare clinicians and adolescents with asthma. However, little is known about the content of the messages exchanged in medical encounters via mobile text messaging. Therefore, this study explored the content of text messaging between clinicians and adolescents with asthma. Materials and Methods: We collected a total of 2,953 text messages exchanged between 5 nurse case managers and 131 adolescents with asthma through a personal digital assistant. The text messages were coded using a scheme developed by adapting categories from the Roter Interaction Analysis System. Results: Nurse case managers sent more text messages (n=2,639) than adolescents with asthma. Most messages sent by nurse case managers were targeted messages (n=2,475) directed at all adolescents with asthma, whereas there were relatively few tailored messages (n=164) that were created personally for an individual adolescent. In addition, both targeted and tailored messages emphasized task-focused behaviors over socioemotional behaviors. Likewise, text messages (n=314) sent by adolescents also emphasized task-focused over socioemotional behaviors. Conclusions: Mobile texting messaging has the potential to play an important role in patient–clinician communication. It promotes not only active interaction, but also patient-centered communication with clinicians. In order to achieve this potential, healthcare clinicians may need to focus on socioemotional communication as well as task-oriented communication. PMID:25401324

  1. Guidelines for designing messages in risk communication

    Takashita, Hirofumi; Horikoshi, Hidehiko

    2004-07-01

    Risk Communication Study Team (hereafter called RC team) has designed messages for risk communication based on the analysis of the local residents' opinions which were expressed in several questionnaire surveys. The messages are described in a side format (Power Point format) every single content. This report provides basic guidelines for making messages that are used for risk communication, and does not include concrete messages which RC team designed. The RC team has already published the report entitled 'Information materials for risk communication' (JNC TN8450 2003-008) separately, and it gives the concrete messages. This report shows general cautions and checklists in designing messages, comments on the messages from outside risk communication experts, and opinions from local residents. (author)

  2. Short message service or disService: issues with text messaging in a complex medical environment.

    Wu, Robert; Appel, Lora; Morra, Dante; Lo, Vivian; Kitto, Simon; Quan, Sherman

    2014-04-01

    Hospitals today are experiencing major changes in their clinical communication workflows as conventional numeric paging and face-to-face verbal conversations are being replaced by computer mediated communication systems. In this paper, we highlight the importance of understanding this transition and discuss some of the impacts that may emerge when verbal clinical conversations are replaced by short text messages. In-depth interviews (n=108) and non-participatory observation sessions (n=260h) were conducted on the General Internal Medicine wards at five academic teaching hospitals in Toronto, Canada. From our analysis of the qualitative data, we identified two major themes. De-contextualization of complex issues led to an increase in misinterpretation and an increase in back and forth messaging for clarification. Depersonalization of communication was due to less verbal conversations and face-to-face interactions and led to a negative impact on work relationships. Text-based communication in hospital settings led to the oversimplification of messages and the depersonalization of communication. It is important to recognize and understand these unintended consequences of new technology to avoid the negative impacts to patient care and work relationships. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  3. Improving the effectiveness of fundraising messages: The impact of charity goal attainment, message framing, and evidence on persuasion

    Das, E.; Kerkhof, P.; Kuiper, J.

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a

  4. Mobile phone text messaging improves antihypertensive drug adherence in the community.

    Varleta, Paola; Acevedo, Mónica; Akel, Carlos; Salinas, Claudia; Navarrete, Carlos; García, Ana; Echegoyen, Carolina; Rodriguez, Daniel; Gramusset, Lissette; Leon, Sandra; Cofré, Pedro; Retamal, Raquel; Romero, Katerine

    2017-12-01

    Antihypertensive drug adherence (ADA) is a mainstay in blood pressure control. Education through mobile phone short message system (SMS) text messaging could improve ADA. The authors conducted a randomized study involving 314 patients with hypertension with Text messaging intervention improved ADA (risk ratio, 1.3; 95% confidence interval, 1.0-1.6 [Ptext messaging resulted in an increase in reporting ADA in this hypertensive Latino population. This approach could become an effective tool to overcome poor medication adherence in the community. ©2017 Wiley Periodicals, Inc.

  5. Randomized trial of a smartphone mobile application compared to text messaging to support smoking cessation.

    Buller, David B; Borland, Ron; Bettinghaus, Erwin P; Shane, James H; Zimmerman, Donald E

    2014-03-01

    Text messaging has successfully supported smoking cessation. This study compares a mobile application with text messaging to support smoking cessation. Young adult smokers 18-30 years old (n = 102) participated in a randomized pretest-posttest trial. Smokers received a smartphone application (REQ-Mobile) with short messages and interactive tools or a text messaging system (onQ), managed by an expert system. Self-reported usability of REQ-Mobile and quitting behavior (quit attempts, point-prevalence, 30-day point-prevalence, and continued abstinence) were assessed in posttests. Overall, 60% of smokers used mobile services (REQ-Mobile, 61%, mean of 128.5 messages received; onQ, 59%, mean of 107.8 messages), and 75% evaluated REQ-Mobile as user-friendly. A majority of smokers reported being abstinent at posttest (6 weeks, 53% of completers; 12 weeks, 66% of completers [44% of all cases]). Also, 37% (25%of all cases) reported 30-day point-prevalence abstinence, and 32% (22% of all cases) reported continuous abstinence at 12 weeks. OnQ produced more abstinence (ptext messaging. Text messaging may work better because it is simple, well known, and delivered to a primary inbox. These advantages may disappear as smokers become more experienced with new handsets. Mobile phones may be promising delivery platforms for cessation services using either smartphone applications or text messaging.

  6. INVESTIGATION OF SINGLE-PASS/DOUBLE-PASS TECHNIQUES ON FRICTION STIR WELDING OF ALUMINIUM

    N.A.A. Sathari

    2014-12-01

    Full Text Available The aim of this research is to study the effects of single-pass/ double-pass techniques on friction stir welding of aluminium. Two pieces of AA1100 with a thickness of 6.0 mm were friction stir welded using a CNC milling machine at rotational speeds of 1400 rpm, 1600 rpm and 1800 rpm respectively for single-pass and double-pass. Microstructure observations of the welded area were studied using an optical microscope. The specimens were tested by using a tensile test and Vickers hardness test to evaluate their mechanical properties. The results indicated that, at low rotational speed, defects such as ‘surface lack of fill’ and tunnels in the welded area contributed to a decrease in mechanical properties. Welded specimens using double-pass techniques show increasing values of tensile strength and hardness. From this investigation it is found that the best parameters of FSW welded aluminium AA1100 plate were those using double-pass techniques that produce mechanically sound joints with a hardness of 56.38 HV and 108 MPa strength at 1800 rpm compared to the single-pass technique. Friction stir welding, single-pass/ double-pass techniques, AA1100, microstructure, mechanical properties.

  7. A Novel Single Pass Authenticated Encryption Stream Cipher for Software Defined Radios

    Khajuria, Samant

    2012-01-01

    to propose cryptographic services such as confidentiality, integrity and authentication. Therefore, integration of security services into SDR devices is essential. Authenticated Encryption schemes donate the class of cryptographic algorithms that are designed for protecting both message confidentiality....... This makes authenticated encryption very attractive for low-cost low-power hardware implementations, as it allows for the substantial decrease in the circuit area and power consumed compared to the traditional schemes. In this thesis, an authenticated encryption scheme is proposed with the focus of achieving...... high throughput and low overhead for SDRs. The thesis is divided into two research topics. One topic is the design of a 1-pass authenticated encryption scheme that can accomplish both message secrecy and authenticity in a single cryptographic primitive. The other topic is the implementation...

  8. Effects of Text Messaging on Academic Performance

    Barks Amanda

    2011-12-01

    Full Text Available University students frequently send and receive cellular phone text messages during classroominstruction. Cognitive psychology research indicates that multi-tasking is frequently associatedwith performance cost. However, university students often have considerable experience withelectronic multi-tasking and may believe that they can devote necessary attention to a classroomlecture while sending and receiving text messages. In the current study, university students whoused text messaging were randomly assigned to one of two conditions: 1. a group that sent andreceived text messages during a lecture or, 2. a group that did not engage in text messagingduring the lecture. Participants who engaged in text messaging demonstrated significantlypoorer performance on a test covering lecture content compared with the group that did notsend and receive text messages. Participants exhibiting higher levels of text messaging skill hadsignificantly lower test scores than participants who were less proficient at text messaging. It ishypothesized that in terms of retention of lecture material, more frequent task shifting by thosewith greater text messaging proficiency contributed to poorer performance. Overall, the findingsdo not support the view, held by many university students, that this form of multitasking has littleeffect on the acquisition of lecture content. Results provide empirical support for teachers andprofessors who ban text messaging in the classroom.

  9. Universal controller for concentration-diffusion of messages

    Yon, Gerard

    1970-01-01

    This research thesis reports the development of a line controller with memory (CLM) designed for data transmission in information processing systems, in this case a THAC 4020 computer, by ensuring power, flexibility and safety of data transmission in noticeable economic conditions. This controller relies on two essential characteristics: message processing at the bit level, and direct storage of messages in a ferrite-torus-based memory without intervention of the computer and even without slowing down its activity. After a recall of issues and techniques related to data transmission, the author defines and discusses the functional specifications of the controller [fr

  10. Setting pass scores for clinical skills assessment.

    Liu, Min; Liu, Keh-Min

    2008-12-01

    In a clinical skills assessment, the decision to pass or fail an examinee should be based on the test content or on the examinees' performance. The process of deciding a pass score is known as setting a standard of the examination. This requires a properly selected panel of expert judges and a suitable standard setting method, which best fits the purpose of the examination. Six standard setting methods that are often used in clinical skills assessment are described to provide an overview of the standard setting process.

  11. Setting Pass Scores for Clinical Skills Assessment

    Min Liu

    2008-12-01

    Full Text Available In a clinical skills assessment, the decision to pass or fail an examinee should be based on the test content or on the examinees' performance. The process of deciding a pass score is known as setting a standard of the examination. This requires a properly selected panel of expert judges and a suitable standard setting method, which best fits the purpose of the examination. Six standard setting methods that are often used in clinical skills assessment are described to provide an overview of the standard setting process.

  12. Single beam pass migmacell method and apparatus

    Maglich, B.C.; Nering, J.E.; Mazarakis, M.G.; Miller, R.A.

    1976-01-01

    The invention provides improvements in migmacell apparatus and method by dispensing with the need for metastable confinement of injected molecular ions for multiple precession periods. Injected molecular ions undergo a 'single pass' through the reaction volume. By preconditioning the injected beam such that it contains a population distribution of molecules in higher vibrational states than in the case of a normal distribution, injected molecules in the single pass exper-ience collisionless dissociation in the migmacell under magnetic influence, i.e., so-called Lorentz dissociation. Dissociationions then form atomic migma

  13. Control Transfer in Operating System Kernels

    1994-05-13

    microkernel system that runs less code in the kernel address space. To realize the performance benefit of allocating stacks in unmapped kseg0 memory, the...review how I modified the Mach 3.0 kernel to use continuations. Because of Mach’s message-passing microkernel structure, interprocess communication was...critical control transfer paths, deeply- nested call chains are undesirable in any case because of the function call overhead. 4.1.3 Microkernel Operating

  14. Does SMS Text Messaging Help or Harm Adults' Knowledge of Standard Spelling?

    Powell, D.; Dixon, M.

    2011-01-01

    The recent increase in short messaging system (SMS) text messaging, often using abbreviated, non-conventional "textisms" (e.g. "2nite"), in school-aged children has raised fears of negative consequences of such technology for literacy. The current research used a paradigm developed by Dixon and Kaminska, who showed that exposure to phonetically…

  15. Control mechanism to prevent correlated message arrivals from degrading signaling no. 7 network performance

    Kosal, Haluk; Skoog, Ronald A.

    1994-04-01

    Signaling System No. 7 (SS7) is designed to provide a connection-less transfer of signaling messages of reasonable length. Customers having access to user signaling bearer capabilities as specified in the ANSI T1.623 and CCITT Q.931 standards can send bursts of correlated messages (e.g., by doing a file transfer that results in the segmentation of a block of data into a number of consecutive signaling messages) through SS7 networks. These message bursts with short interarrival times could have an adverse impact on the delay performance of the SS7 networks. A control mechanism, Credit Manager, is investigated in this paper to regulate incoming traffic to the SS7 network by imposing appropriate time separation between messages when the incoming stream is too bursty. The credit manager has a credit bank where credits accrue at a fixed rate up to a prespecified credit bank capacity. When a message arrives, the number of octets in that message is compared to the number of credits in the bank. If the number of credits is greater than or equal to the number of octets, then the message is accepted for transmission and the number of credits in the bank is decremented by the number of octets. If the number of credits is less than the number of octets, then the message is delayed until enough credits are accumulated. This paper presents simulation results showing delay performance of the SS7 ISUP and TCAP message traffic with a range of correlated message traffic, and control parameters of the credit manager (i.e., credit generation rate and bank capacity) are determined that ensure the traffic entering the SS7 network is acceptable. The results show that control parameters can be set so that for any incoming traffic stream there is no detrimental impact on the SS7 ISUP and TCAP message delay, and the credit manager accepts a wide range of traffic patterns without causing significant delay.

  16. The WLCG Messaging Service and its Future

    Cons, Lionel; Paladin, Massimo

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures will support the growth of the WLCG messaging service.

  17. Hand hygiene posters: motivators or mixed messages?

    Jenner, E A; Jones, F; Fletcher, B C; Miller, L; Scott, G M

    2005-07-01

    Poster campaigns regarding hand hygiene are commonly used by infection control teams to improve practice, yet little is known of the extent to which they are based on established theory or research. This study reports on the content analysis of hand hygiene posters (N=69) and their messages (N=75) using message-framing theory. The results showed that posters seldom drew on knowledge about effective ways to frame messages. Frequently, they simply conveyed information 'telling' rather than 'selling' and some of this was confusing. Most posters were not designed to motivate, and some conveyed mixed messages. Few used fear appeals. Hand hygiene posters could have a greater impact if principles of message framing were utilized in their design. Suggestions for gain-framed messages are offered, but these need to be tested empirically.

  18. Message Scheduling and Forwarding in Congested DTNs

    Elwhishi, Ahmed; Ho, Pin-Han; Shihada, Basem

    2012-01-01

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  19. Message Scheduling and Forwarding in Congested DTNs

    Elwhishi, Ahmed

    2012-08-19

    Multi-copy utility-based routing has been considered as one of the most applicable approaches to effective message delivery in Delay Tolerant Networks (DTNs). By allowing multiple message replicas launched, the ratio of message delivery or delay can be significantly reduced compared with other counterparts. Such an advantage, nonetheless, is at the expense of taking more buffer space at each node and higher complexity in message forwarding decisions. This paper investigates an efficient message scheduling and dropping policy via analytical modeling approach, aiming to achieve optimal performance in terms of message delivery delay. Extensive simulation results, based on a synthetic mobility model and real mobility traces, show that the proposed scheduling framework can achieve superb performance against its counterparts in terms of delivery delay.

  20. Learning from Marketing: Rapid Development of Medication Messages that Engage Patients

    Yank, Veronica; Tribett, Erika; Green, Lydia; Pettis, Jasmine

    2015-01-01

    Objective To adapt marketing approaches in a health services environment. Methods Researchers and advertising professionals partnered in developing advertising-style messages designed to activate patients pre-identified as having chronic kidney disease to ask providers about recommended medications. We assessed feasibility of the development process by evaluating partnership structure, costs, and timeframe. We tested messages with patients and providers using preliminary surveys to refine initial messages and subsequent focus groups to identify the most persuasive ones. Results The partnership achieved an efficient structure, $14,550 total costs, and 4-month timeframe. The advertising team developed 11 initial messages. The research team conducted surveys and focus groups with a total of 13 patients and 8 providers to identify three messages as most activating. Focus group themes suggested the general approach of using advertising-style messages was acceptable if it supported patient-provider relationships and had a credible evidence base. Individual messages were more motivating if they elicited personal identification with imagery, particular emotions, active patient role, and message clarity. Conclusion We demonstrated feasibility of a research-advertising partnership and acceptability and likely impact of advertising-style messages on patient medication-seeking behavior. Practice Implications Healthcare systems may want to replicate our adaptation of marketing approaches to patients with chronic conditions. PMID:25913245

  1. Learning from marketing: Rapid development of medication messages that engage patients.

    Yank, Veronica; Tribett, Erika; Green, Lydia; Pettis, Jasmine

    2015-08-01

    To adapt marketing approaches in a health services environment. Researchers and advertising professionals partnered in developing advertising-style messages designed to activate patients pre-identified as having chronic kidney disease to ask providers about recommended medications. We assessed feasibility of the development process by evaluating partnership structure, costs, and timeframe. We tested messages with patients and providers using preliminary surveys to refine initial messages and subsequent focus groups to identify the most persuasive ones. The partnership achieved an efficient structure, $14,550 total costs, and 4-month timeframe. The advertising team developed 11 initial messages. The research team conducted surveys and focus groups with a total of 13 patients and 8 providers to identify three messages as most activating. Focus group themes suggested the general approach of using advertising-style messages was acceptable if it supported patient-provider relationships and had a credible evidence base. Individual messages were more motivating if they elicited personal identification with imagery, particular emotions, active patient role, and message clarity. We demonstrated feasibility of a research-advertising partnership and acceptability and likely impact of advertising-style messages on patient medication-seeking behavior. Healthcare systems may want to replicate our adaptation of marketing approaches to patients with chronic conditions. Copyright © 2015. Published by Elsevier Ireland Ltd.

  2. Design and implementation of a message-based communication for distributed systems; Entwurf und Implementierung einer gesicherten nachrichtenbasierten Kommunikation fuer verteilte Anwendungen

    Rasenack, R.; Teufel, T. [Technische Univ. Hamburg-Harburg (Germany). Inst. fuer Zuverlaessiges Rechnen

    2006-07-01

    Distributed systems use communication platforms to transfer data between processes. This article presents a design for an interprocess-communication based on TCP/IP. The method of solution is transparent and efficient on the highest degree. The developer can adapt the protocol and the datatypes independently, according to the special attributes of the system and the communication-channel. The design describes an autonomous component, which can be used in different applications. (orig.)

  3. Temporal Proof Methodologies for Real-Time Systems,

    1990-09-01

    real time systems that communicate either through shared variables or by message passing and real time issues such as time-outs, process priorities (interrupts) and process scheduling. The authors exhibit two styles for the specification of real - time systems . While the first approach uses bounded versions of temporal operators the second approach allows explicit references to time through a special clock variable. Corresponding to two styles of specification the authors present and compare two fundamentally different proof

  4. Application of a Tsunami Warning Message Metric to refine NOAA NWS Tsunami Warning Messages

    Gregg, C. E.; Johnston, D.; Sorensen, J.; Whitmore, P.

    2013-12-01

    In 2010, the U.S. National Weather Service (NWS) funded a three year project to integrate social science into their Tsunami Program. One of three primary requirements of the grant was to make improvements to tsunami warning messages of the NWS' two Tsunami Warning Centers- the West Coast/Alaska Tsunami Warning Center (WCATWC) in Palmer, Alaska and the Pacific Tsunami Warning Center (PTWC) in Ewa Beach, Hawaii. We conducted focus group meetings with a purposive sample of local, state and Federal stakeholders and emergency managers in six states (AK, WA, OR, CA, HI and NC) and two US Territories (US Virgin Islands and American Samoa) to qualitatively asses information needs in tsunami warning messages using WCATWC tsunami messages for the March 2011 Tohoku earthquake and tsunami event. We also reviewed research literature on behavioral response to warnings to develop a tsunami warning message metric that could be used to guide revisions to tsunami warning messages of both warning centers. The message metric is divided into categories of Message Content, Style, Order and Formatting and Receiver Characteristics. A message is evaluated by cross-referencing the message with the operational definitions of metric factors. Findings are then used to guide revisions of the message until the characteristics of each factor are met. Using findings from this project and findings from a parallel NWS Warning Tiger Team study led by T. Nicolini, the WCATWC implemented the first of two phases of revisions to their warning messages in November 2012. A second phase of additional changes, which will fully implement the redesign of messages based on the metric, is in progress. The resulting messages will reflect current state-of-the-art knowledge on warning message effectiveness. Here we present the message metric; evidence-based rational for message factors; and examples of previous, existing and proposed messages.

  5. Generalizing Galileo's Passe-Dix Game

    Hombas, Vassilios

    2012-01-01

    This article shows a generalization of Galileo's "passe-dix" game. The game was born following one of Galileo's [G. Galileo, "Sopra le Scoperte dei Dadi" (Galileo, Opere, Firenze, Barbera, Vol. 8). Translated by E.H. Thorne, 1898, pp. 591-594] explanations on a paradox that occurred in the experiment of tossing three fair "six-sided" dice.…

  6. TREsPASS Book 3: Creative Engagements

    Coles-Kemp, Lizzie; Hall, Peter

    2016-01-01

    In this book we examine the role that creative security engagements have played in the TREsPASS project. These engagements are part of a wider creative securities approach that explores the contributions that social practices make to protection of data and information. Our most popular creative

  7. Passing the Bond Issue (with Related Video)

    Erickson, Paul W.

    2011-01-01

    When a bond referendum comes around for a school district, it often is the culmination of years of planning, strategizing and communicating to the public. Especially in these economic times, passing a building referendum is challenging. Complete transparency among the superintendent, school board and community is essential to communicate the…

  8. Message Received: Virtual Ethnography in Online Message Boards

    Kevin F. Steinmetz

    2012-02-01

    Full Text Available As the Internet begins to encapsulate more people within online communities, it is important that the social researcher have well-rounded ethnographic methodologies for observing these phenomena. This article seeks to contribute to methodology by detailing and providing insights into three specific facets of virtual ethnography that need attention: space and time, identity and authenticity, and ethics. Because the Internet is a globalized and instantaneous medium where space and time collapse, identity becomes more playful, and ethics become more tenuous; understanding these aspects is crucial to the study of online social groups. A second focus of this article is to apply these notions to the study of online message boards—a frequently used medium for online communication that is frequently overlooked by methodologists.

  9. Pass-band reconfigurable spoof surface plasmon polaritons

    Zhang, Hao Chi; He, Pei Hang; Gao, Xinxin; Tang, Wen Xuan; Cui, Tie Jun

    2018-04-01

    In this paper, we introduce a new scheme to construct the band-pass tunable filter based on the band-pass reconfigurable spoof surface plasmon polaritons (SPPs), whose cut-off frequencies at both sides of the passband can be tuned through changing the direct current (DC) bias of varactors. Compared to traditional technology (e.g. microstrip filters), the spoof SPP structure can provide more tight field confinement and more significant field enhancement, which is extremely valuable for many system applications. In order to achieve this scheme, we proposed a specially designed SPP filter integrated with varactors and DC bias feeding structure to support the spoof SPP passband reconfiguration. Furthermore, the full-wave simulated result verifies the outstanding performance on both efficiency and reconfiguration, which has the potential to be widely used in advanced intelligent systems.

  10. Sistema de ayuda para la redacción de mensajes en un servicio de referencia por correo electrónico Help system for messages writing in a reference service via e-mail

    Pedro Falcato

    2005-12-01

    Full Text Available El presente artículo trata el origen, el desarrollo y las propiedades del sistema de ayuda que utiliza un servicio de referencia digital como apoyo para elaborar respuestas. Está basado en la compilación y clasificación de locuciones de uso frecuente cuya eficacia comunicativa ha sido puesta a prueba en la práctica, adaptadas de modo tal que el referencista puede emplearlas como módulos para construir los mensajes. Se exponen las principales características de la interfaz diseñada. Se tratan también los alcances y limitaciones que tiene un sistema de este tipo, así como la aplicabilidad de la idea que le dio origen para construir ayudas equivalentes en otros entornos de referencia.The article deals with the origin, development, and properties of the help system used by a digital reference service as a support to develop answers. It is based on the compilation and classification of frequently used idioms whose communication effectiveness was practically put to the test, adapted in such a way that the reference librarian can use them as modules to construct the messages. Main characteristics of the interface design are stated. Scopes and limitations of that kind of system are discussed as well as the compatibility of the original idea to build equivalent helps in some other reference environment.

  11. Modeling drivers' passing duration and distance in a virtual environment

    Haneen Farah

    2013-07-01

    The main contribution of this paper is in the empirical models developed for passing duration and distance which highlights the factors that affect drivers' passing behavior and can be used to enhance the passing models in simulation programs.

  12. Message framing in social networking sites.

    Kao, Danny Tengti; Chuang, Shih-Chieh; Wang, Sui-Min; Zhang, Lei

    2013-10-01

    Online social networking sites represent significant new opportunities for Internet advertisers. However, results based on the real world cannot be generalized to all virtual worlds. In this research, the moderating effects of need for cognition (NFC) and knowledge were applied to examine the impact of message framing on attitudes toward social networking sites. A total of 216 undergraduates participated in the study. Results reveal that for social networking sites, while high-NFC individuals form more favorable attitudes toward negatively framed messages than positively framed messages, low-NFC individuals form more favorable attitudes toward positively framed messages than negatively framed messages. In addition, low-knowledge individuals demonstrate more favorable attitudes toward negatively framed messages than positively framed messages; however, the framing effect does not differentially affect the attitudes of high-knowledge individuals. Furthermore, the framing effect does not differentially affect the attitudes of high-NFC individuals with high knowledge. In contrast, low-NFC individuals with low knowledge hold more favorable attitudes toward positively framed messages than negatively framed messages.

  13. Evaluation of Sexual Communication Message Strategies

    2011-01-01

    Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC) have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity. PMID:21599875

  14. Mobile phone messaging reminders for attendance at healthcare appointments.

    Gurol-Urganci, Ipek; de Jongh, Thyra; Vodopivec-Jamsek, Vlasta; Atun, Rifat; Car, Josip

    2013-12-05

    This review is an update of the original Cochrane review published in July 2012. Missed appointments are a major cause of inefficiency in healthcare delivery with substantial monetary costs for the health system, leading to delays in diagnosis and appropriate treatment. Patients' forgetfulness is one of the main reasons for missed appointments. Patient reminders may help reduce missed appointments. Modes of communicating reminders for appointments to patients include face-to-face communication, postal messages, calls to landlines or mobile phones, and mobile phone messaging. Mobile phone messaging applications, such as Short Message Service (SMS) and Multimedia Message Service (MMS), could provide an important, inexpensive delivery medium for reminders for healthcare appointments. To update our review assessing the effects of mobile phone messaging reminders for attendance at healthcare appointments. Secondary objectives include assessment of costs; health outcomes; patients' and healthcare providers' evaluation of the intervention and perceptions of safety; and possible harms and adverse effects associated with the intervention. Original searches were run in June 2009. For this update, we searched the Cochrane Central Register of Controlled Trials (CENTRAL,The Cochrane Library 2012, Issue 8), MEDLINE (OvidSP) (January 1993 to August 2012), EMBASE (OvidSP) (January 1993 to August 2012), PsycINFO (OvidSP) (January 1993 to August 2012) and CINAHL (EbscoHOST) (January 1993 to August 2012). We also reviewed grey literature (including trial registers) and reference lists of articles. Randomised controlled trials (RCTs) assessing mobile phone messaging as reminders for healthcare appointments. We only included studies in which it was possible to assess effects of mobile phone messaging independent of other technologies or interventions.   Two review authors independently assessed all studies against the inclusion criteria, with any disagreements resolved by a third

  15. Forest Analysis by Single-Pass Millimeterwave SAR Tomography

    Schmitt, Michael; Zhu, Xiao Xiang

    2016-01-01

    Recent investigations show that millimeterwave SAR tomography provides an interesting means for the analysis of forested areas, especially if single-pass systems are employed. Providing very high resolutions in the decimeter domain and highly coherent data also for slightly windy conditions, even individual trees can be considered. Besides, it has been shown that a certain amount of canopy penetration is possible in spite of the short wavelength.

  16. Presentation of dynamically overlapping auditory messages in user interfaces

    Papp, III, Albert Louis [Univ. of California, Davis, CA (United States)

    1997-09-01

    This dissertation describes a methodology and example implementation for the dynamic regulation of temporally overlapping auditory messages in computer-user interfaces. The regulation mechanism exists to schedule numerous overlapping auditory messages in such a way that each individual message remains perceptually distinct from all others. The method is based on the research conducted in the area of auditory scene analysis. While numerous applications have been engineered to present the user with temporally overlapped auditory output, they have generally been designed without any structured method of controlling the perceptual aspects of the sound. The method of scheduling temporally overlapping sounds has been extended to function in an environment where numerous applications can present sound independently of each other. The Centralized Audio Presentation System is a global regulation mechanism that controls all audio output requests made from all currently running applications. The notion of multimodal objects is explored in this system as well. Each audio request that represents a particular message can include numerous auditory representations, such as musical motives and voice. The Presentation System scheduling algorithm selects the best representation according to the current global auditory system state, and presents it to the user within the request constraints of priority and maximum acceptable latency. The perceptual conflicts between temporally overlapping audio messages are examined in depth through the Computational Auditory Scene Synthesizer. At the heart of this system is a heuristic-based auditory scene synthesis scheduling method. Different schedules of overlapped sounds are evaluated and assigned penalty scores. High scores represent presentations that include perceptual conflicts between over-lapping sounds. Low scores indicate fewer and less serious conflicts. A user study was conducted to validate that the perceptual difficulties predicted by

  17. Use of text messaging in general practice: a mixed methods investigation on GPs' and patients' views.

    Leahy, Dorothy; Lyons, Aoife; Dahm, Matthias; Quinlan, Diarmuid; Bradley, Colin

    2017-11-01

    Text messaging has become more prevalent in general practice as a tool with which to communicate with patients. The main objectives were to assess the extent, growth, and perceived risks and benefits of text messaging by GPs to communicate with patients, and assess patients' attitudes towards receiving text messages from their GP. A mixed methods study, using surveys, a review, and a focus group, was conducted in both urban and rural practices in the south-west of Ireland. A telephone survey of 389 GPs was conducted to ascertain the prevalence of text messaging. Subsequently, the following were also carried out: additional telephone surveys with 25 GPs who use text messaging and 26 GPs who do not, a written satisfaction survey given to 78 patients, a review of the electronic information systems of five practices, and a focus group with six GPs to ascertain attitudes towards text messaging. In total, 38% ( n = 148) of the surveyed GPs used text messaging to communicate with patients and 62% ( n = 241) did not. Time management was identified as the key advantage of text messaging among GPs who used it (80%; n = 20) and those who did not (50%; n = 13). Confidentiality was reported as the principal concern among both groups, at 32% ( n = 8) and 69% ( n = 18) respectively. Most patients (99%; n = 77) were happy to receive text messages from their GP. The GP focus group identified similar issues and benefits in terms of confidentiality and time management. Data were extracted from the IT systems of five consenting practices and the number of text messages sent during the period from January 2013 to March 2016 was generated. This increased by 40% per annum. Collaborative efforts are required from relevant policymakers to address data protection and text messaging issues so that GPs can be provided with clear guidelines to protect patient confidentiality. © British Journal of General Practice 2017.

  18. Integration of Advanced Concepts and Vehicles Into the Next Generation Air Transportation System. Volume 1; Introduction, Key Messages, and Vehicle Attributes

    Zellweger, Andres; Resnick, Herbert; Stevens, Edward; Arkind, Kenneth; Cotton William B.

    2010-01-01

    Raytheon, in partnership with NASA, is leading the way in ensuring that the future air transportation continues to be a key driver of economic growth and stability and that this system provides an environmentally friendly, safe, and effective means of moving people and goods. A Raytheon-led team of industry and academic experts, under NASA contract NNA08BA47C, looked at the potential issues and impact of introducing four new classes of advanced aircraft into the next generation air transportation system -- known as NextGen. The study will help determine where NASA should further invest in research to support the safe introduction of these new air vehicles. Small uncrewed or unmanned aerial systems (SUAS), super heavy transports (SHT) including hybrid wing body versions (HWB), very light jets (VLJ), and supersonic business jets (SSBJ) are the four classes of aircraft that we studied. Understanding each vehicle's business purpose and strategy is critical to assessing the feasibility of new aircraft operations and their impact on NextGen's architecture. The Raytheon team used scenarios created by aviation experts that depict vehicles in year 2025 operations along with scripts or use cases to understand the issues presented by these new types of vehicles. The information was then mapped into the Joint Planning and Development Office's (JPDO s) Enterprise Architecture to show how the vehicles will fit into NextGen's Concept of Operations. The team also identified significant changes to the JPDO's Integrated Work Plan (IWP) to optimize the NextGen vision for these vehicles. Using a proven enterprise architecture approach and the JPDO s Joint Planning Environment (JPE) web site helped make the leap from architecture to planning efficient, manageable and achievable. Very Light Jets flying into busy hub airports -- Supersonic Business Jets needing to climb and descend rapidly to achieve the necessary altitude Super-heavy cargo planes requiring the shortest common flight

  19. Contact conditions in skin-pass rolling

    Kijima, Hideo; Bay, Niels

    2007-01-01

    The special contact conditions in skin-pass rolling of steel strip is analysed by studying plane strain upsetting of thin sheet with low reduction applying long narrow tools and dry friction conditions. An extended sticking region is estimated by an elasto-plastic FEM analysis of the plane strain...... upsetting. This sticking region causes a highly inhomogeneous elasto-plastic deformation with large influence of work-hardening and friction. A numerical analysis of skin-pass rolling shows the same contact conditions, i.e. an extended sticking region around the center of the contact zone. The calculated...... size of the sticking region with varying contact length and pressure/reduction is experimentally verified by plane strain upsetting tests measuring the local surface deformation of the work pieces after unloading....

  20. Two-pass greedy regular expression parsing

    Grathwohl, Niels Bjørn Bugge; Henglein, Fritz; Nielsen, Lasse

    2013-01-01

    We present new algorithms for producing greedy parses for regular expressions (REs) in a semi-streaming fashion. Our lean-log algorithm executes in time O(mn) for REs of size m and input strings of size n and outputs a compact bit-coded parse tree representation. It improves on previous algorithms...... by: operating in only 2 passes; using only O(m) words of random-access memory (independent of n); requiring only kn bits of sequentially written and read log storage, where k ... and not requiring it to be stored at all. Previous RE parsing algorithms do not scale linearly with input size, or require substantially more log storage and employ 3 passes where the first consists of reversing the input, or do not or are not known to produce a greedy parse. The performance of our unoptimized C...

  1. Beam dynamics simulation of a double pass proton linear accelerator

    Kilean Hwang

    2017-04-01

    Full Text Available A recirculating superconducting linear accelerator with the advantage of both straight and circular accelerator has been demonstrated with relativistic electron beams. The acceleration concept of a recirculating proton beam was recently proposed [J. Qiang, Nucl. Instrum. Methods Phys. Res., Sect. A 795, 77 (2015NIMAER0168-900210.1016/j.nima.2015.05.056] and is currently under study. In order to further support the concept, the beam dynamics study on a recirculating proton linear accelerator has to be carried out. In this paper, we study the feasibility of a two-pass recirculating proton linear accelerator through the direct numerical beam dynamics design optimization and the start-to-end simulation. This study shows that the two-pass simultaneous focusing without particle losses is attainable including fully 3D space-charge effects through the entire accelerator system.

  2. Expectancy Theory in Media and Message Selection.

    Van Leuven, Jim

    1981-01-01

    Argues for reversing emphasis on uses and gratifications research in favor of an expectancy model which holds that selection of a particular medium depends on (1) the expectation that the choice will be followed by a message of interest and (2) the importance of that message in satisfying user's values. (PD)

  3. Should We Ban Instant Messaging In School?

    Texley, Sharon; DeGennaro, Donna

    2005-01-01

    This article is a brief debate on the pros and cons of allowing students to use instant messaging (IM) in school. On one hand, teenagers' desire to socialize can overcome other priorities and schools may set policies to ban instant messaging. The contrary view is that schools should embrace the IM technology being popularized by youth and find…

  4. 78 FR 64202 - Quantitative Messaging Research

    2013-10-28

    ... COMMODITY FUTURES TRADING COMMISSION Quantitative Messaging Research AGENCY: Commodity Futures... survey will follow qualitative message testing research (for which CFTC received fast- track OMB approval... comments. Please submit your comments using only one method and identify that it is for the ``Quantitative...

  5. Undergraduates' Text Messaging Language and Literacy Skills

    Grace, Abbie; Kemp, Nenagh; Martin, Frances Heritage; Parrila, Rauno

    2014-01-01

    Research investigating whether people's literacy skill is being affected by the use of text messaging language has produced largely positive results for children, but mixed results for adults. We asked 150 undergraduate university students in Western Canada and 86 in South Eastern Australia to supply naturalistic text messages and to complete…

  6. Arbitrated quantum signature scheme with message recovery

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  7. Messages about Sexuality: An Ecological Perspective

    Boone, Tanya L.

    2015-01-01

    The goal of this two-part study was to identify the perceived influence of sexuality messages from parents, peers, school and the media--four microsystems within the Ecological Model--on emerging adult US college women's sexual attitudes. Findings suggest that parents were the most likely source of the message to "remain abstinent until…

  8. Suspecting Neurological Dysfunction From E Mail Messages ...

    A non medical person suspected and confirmed neurological dysfunction in an individual, based only on e mail messages sent by the individual. With email communication becoming rampant “peculiar” email messages may raise the suspicion of neurological dysfunction. Organic pathology explaining the abnormal email ...

  9. Single Pass Albumin Dialysis in Hepatorenal Syndrome

    Rahman Ebadur

    2008-01-01

    Full Text Available Hepatorenal syndrome (HRS is the most appalling complication of acute or chronic liver disease with 90% mortality rate. Single pass albumin dialysis (SPAD can be considered as a noble liver support technique in HRS. Here, we present a case of a young healthy patient who developed hyperacute fulminant liver failure that progressed to HRS. The patient was offered SPAD as a bridge to liver transplantation, however, it resulted in an excellent recovery.

  10. Double-pass quantum volume hologram

    Vasilyev, Denis V.; Sokolov, Ivan V.

    2011-01-01

    We propose a scheme for parallel, spatially multimode quantum memory for light. The scheme is based on the propagation in different directions of a quantum signal wave and strong classical reference wave, like in a classical volume hologram and the previously proposed quantum volume hologram [D. V. Vasilyev et al., Phys. Rev. A 81, 020302(R) (2010)]. The medium for the hologram consists of a spatially extended ensemble of cold spin-polarized atoms. In the absence of the collective spin rotation during the interaction, two passes of light for both storage and retrieval are required, and therefore the present scheme can be called a double-pass quantum volume hologram. The scheme is less sensitive to diffraction and therefore is capable of achieving a higher density of storage of spatial modes as compared to the previously proposed thin quantum hologram [D. V. Vasilyev et al., Phys. Rev. A 77, 020302(R) (2008)], which also requires two passes of light for both storage and retrieval. However, the present scheme allows one to achieve a good memory performance with a lower optical depth of the atomic sample as compared to the quantum volume hologram. A quantum hologram capable of storing entangled images can become an important ingredient in quantum information processing and quantum imaging.

  11. Extensions to the Parallel Real-Time Artificial Intelligence System (PRAIS) for fault-tolerant heterogeneous cycle-stealing reasoning

    Goldstein, David

    1991-01-01

    Extensions to an architecture for real-time, distributed (parallel) knowledge-based systems called the Parallel Real-time Artificial Intelligence System (PRAIS) are discussed. PRAIS strives for transparently parallelizing production (rule-based) systems, even under real-time constraints. PRAIS accomplished these goals (presented at the first annual C Language Integrated Production System (CLIPS) conference) by incorporating a dynamic task scheduler, operating system extensions for fact handling, and message-passing among multiple copies of CLIPS executing on a virtual blackboard. This distributed knowledge-based system tool uses the portability of CLIPS and common message-passing protocols to operate over a heterogeneous network of processors. Results using the original PRAIS architecture over a network of Sun 3's, Sun 4's and VAX's are presented. Mechanisms using the producer-consumer model to extend the architecture for fault-tolerance and distributed truth maintenance initiation are also discussed.

  12. The WLCG Messaging Service and its Future

    Cons, Lionel

    2012-01-01

    Enterprise messaging is seen as an attractive mechanism to simplify and extend several portions of the Grid middleware, from low level monitoring to experiments dashboards. The production messaging service currently used by WLCG includes four tightly coupled brokers operated by EGI (running Apache ActiveMQ and designed to host the Grid operational tools such as SAM) as well as two dedicated services for ATLAS-DDM and experiments dashboards (currently also running Apache ActiveMQ). In the future, this service is expected to grow in numbers of applications supported, brokers and technologies. The WLCG Messaging Roadmap identified three areas with room for improvement (security, scalability and availability/reliability) as well as ten practical recommendations to address them. This paper describes a messaging service architecture that is in line with these recommendations as well as a software architecture based on reusable components that ease interactions with the messaging service. These two architectures wil...

  13. Factors influencing message dissemination through social media

    Zheng, Zeyu; Yang, Huancheng; Fu, Yang; Fu, Dianzheng; Podobnik, Boris; Stanley, H. Eugene

    2018-06-01

    Online social networks strongly impact our daily lives. An internet user (a "Netizen") wants messages to be efficiently disseminated. The susceptible-infected-recovered (SIR) dissemination model is the traditional tool for exploring the spreading mechanism of information diffusion. We here test our SIR-based dissemination model on open and real-world data collected from Twitter. We locate and identify phase transitions in the message dissemination process. We find that message content is a stronger factor than the popularity of the sender. We also find that the probability that a message will be forwarded has a threshold that affects its ability to spread, and when the probability is above the threshold the message quickly achieves mass dissemination.

  14. Hand hygiene posters: selling the message.

    Jenner, E A; Jones, F; Fletcher, B C; Miller, L; Scott, G M

    2005-02-01

    This literature review was undertaken to determine the established theory and research that might be utilized to inform the construction of persuasive messages on hand hygiene posters. It discusses the principles of message framing and the use of fear appeals. Current theory suggests that the most effective messages for health promotion behaviours should be framed in terms of gains rather than losses for the individual. However, as clinical hand hygiene is largely for the benefit of others (i.e. patients), messages should also invoke a sense of personal responsibility and appeal to altruistic behaviour. The use of repeated minimal fear appeals have their place. Posters that simply convey training messages are not effective persuaders.

  15. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    García JoséAPérez

    2008-01-01

    Full Text Available Abstract Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  16. Messaging Performance of FIPA Interaction Protocols in Networked Embedded Controllers

    Omar Jehovani López Orozco

    2007-12-01

    Full Text Available Agent-based technologies in production control systems could facilitate seamless reconfiguration and integration of mechatronic devices/modules into systems. Advances in embedded controllers which are continuously improving computational capabilities allow for software modularization and distribution of decisions. Agent platforms running on embedded controllers could hide the complexity of bootstrap and communication. Therefore, it is important to investigate the messaging performance of the agents whose main motivation is the resource allocation in manufacturing systems (i.e., conveyor system. The tests were implemented using the FIPA-compliant JADE-LEAP agent platform. Agent containers were distributed through networked embedded controllers, and agents were communicating using request and contract-net FIPA interaction protocols. The test scenarios are organized in intercontainer and intracontainer communications. The work shows the messaging performance for the different test scenarios using both interaction protocols.

  17. Messages about appearance, food, weight and exercise in "tween" television.

    Simpson, Courtney C; Kwitowski, Melissa; Boutte, Rachel; Gow, Rachel W; Mazzeo, Suzanne E

    2016-12-01

    Tweens (children ages ~8-14years) are a relatively recently defined age group, increasingly targeted by marketers. Individuals in this age group are particularly vulnerable to opinions and behaviors presented in media messages, given their level of cognitive and social development. However, little research has examined messages about appearance, food, weight, and exercise in television specifically targeting tweens, despite the popularity of this media type among this age group. This study used a content analytic approach to explore these messages in the five most popular television shows for tweens on the Disney Channel (as of 2015). Using a multiple-pass approach, relevant content in episodes from the most recently completed seasons of each show was coded. Appearance related incidents occurred in every episode; these most frequently mentioned attractiveness/beauty. Food related incidents were also present in every episode; typically, these situations were appearance and weight neutral. Exercise related incidents occurred in 53.3% of episodes; the majority expressed resistance to exercise. Weight related incidents occurred in 40.0% of the episodes; the majority praised the muscular ideal. Women were more likely to initiate appearance incidents, and men were more likely to initiate exercise incidents. These results suggest that programs specifically marketed to tweens reinforce appearance ideals, including stereotypes about female attractiveness and male athleticism, two constructs linked to eating pathology and body dissatisfaction. Given the developmental vulnerability of the target group, these findings are concerning, and highlight potential foci for prevention programming, including media literacy, for tweens. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. Designing Anti-Binge Drinking Prevention Messages: Message Framing vs. Evidence Type.

    Kang, Hannah; Lee, Moon J

    2017-09-27

    We investigated whether presenting anti-binge drinking health campaign messages in different message framing and evidence types influences college students' intention to avoid binge drinking, based on prospect theory (PT) and exemplification theory. A 2 (message framing: loss-framed message/gain-framed message) X 2 (evidence type: statistical/narrative) between-subjects factorial design with a control group was conducted with 156 college students. College students who were exposed to the loss-framed message condition exhibited a higher level of intention to avoid binge drinking in the near future than those who did not see any messages (the control group). This finding was mainly among non-binge drinkers. Regardless of evidence type, those who were exposed to the messages exhibited a higher level of intention to avoid binge drinking than those in the control group. This is also mainly among non-binge drinkers. We also found the main effects of message framing and evidence type on attitude toward the message and the main effect of message framing on attitude toward drinking.

  19. "Which pass is better?" Novel approaches to assess passing effectiveness in elite soccer.

    Rein, Robert; Raabe, Dominik; Memmert, Daniel

    2017-10-01

    Passing behaviour is a key property of successful performance in team sports. Previous investigations however have mainly focused on notational measurements like total passing frequencies which provide little information about what actually constitutes successful passing behaviour. Consequently, this has hampered the transfer of research findings into applied settings. Here we present two novel approaches to assess passing effectiveness in elite soccer by evaluating their effects on majority situations and space control in front of the goal. Majority situations are assessed by calculating the number of defenders between the ball carrier and the goal. Control of space is estimated using Voronoi-diagrams based on the player's positions on the pitch. Both methods were applied to position data from 103 German First division games from the 2011/2012, 2012/2013 and 2014/2015 seasons using a big data approach. The results show that both measures are significantly related to successful game play with respect to the number of goals scored and to the probability of winning a game. The results further show that on average passes from the mid-field into the attacking area are most effective. The presented passing efficiency measures thereby offer new opportunities for future applications in soccer and other sports disciplines whilst maintaining practical relevance with respect to tactical training regimes or game performances analysis. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Improving the Effectiveness of Fundraising Messages: The Impact of Charity Goal Attainment, Message Framing, and Evidence on Persuasion

    Das, Enny; Kerkhof, Peter; Kuiper, Joyce

    2008-01-01

    This experimental study assessed the effectiveness of fundraising messages. Based on recent findings regarding the effects of message framing and evidence, effective fundraising messages should combine abstract, statistical information with a negative message frame and anecdotal evidence with a positive message frame. In addition, building on…

  1. An adaptive synchronization strategy based on active control for demodulating message hidden in chaotic signals

    Tang Fang

    2008-01-01

    In the field of secure communication, it is very important to demodulate the message hidden in chaotic signals. In this paper, an adaptive synchronization strategy based on active control is proposed, which is used to design an active controller and an appropriate adaptive demodulator at the receiver to recover the transmitted message hidden in chaotic signals of a drive system. Based on Lyapunov stability theory, it is shown that the transmitted message can be theoretically recovered by using the proposed strategy. Numerical simulations based on the Chua's circuit are also presented to verify the effectiveness of the proposed strategy. In addition, it is shown via simulations that, by increasing the gain of the active controller the message error caused by the external noise and the discontinuous property of the message can be reduced

  2. Learning experiences in population education: proposed guidelines and core messages.

    1984-01-01

    As a result of the 1984 Regional Workshop for the Development of Packages of Adequate Learning Requirements in Population Education, the participants tackled the problem of non-institutionalization of population education into the formal and non-formal educational curricula in their countries. Based on their deliberations, several sets of guidelines and core messages were formulated to provide countries with a more definite direction that will hopefully ensure the functional and effective integration of population education in their respective national school and out-of-school curriculum system. Useful packages of learning materials in population education should help realize the country's population policy and goals within the broader framework of socioeconomic development, and the content of the package should comprehensively cover the core messages of the country's Population Information, Education and Communication (IEC) Program. The population knowledge base of the package should be accurate and relevant; the package should provide for graphic and visual presentation and for assessment of effects on the target groups. Proposed core messages in population education discuss the advantages of small family size and delayed marriage, and aspects of responsible parenthood. Other messages discuss population resource development and population-related beliefs and values.

  3. Development of a Social DTN for Message Communication between SNS Group Members

    Hidenori Takasuka

    2018-04-01

    Full Text Available Smartphones have the ability to communicate with other terminals through ad hoc connections. A variety of applications have been developed to exploit this ability. The authors have developed an Android OS (operating system application (called “social DTN manager” that builds a DTN (delay, disruption, disconnection tolerant networking among members of a social networking service (SNS community using a community token. The members can exchange messages over this network. Control messages for building a DTN are forwarded to only those nodes that use the same community token in order to reduce flooding of message copies. When a source node sends a communication request to its destination node, they exchange control messages to establish a communication route. Relay nodes use these messages to create and hold routing information for these nodes in their routing tables. Thereafter, relay nodes can forward data messages based on their routing tables. This again reduces flooding of message copies. The social DTN manager incorporates these functions, Facebook Graph API and Google Nearby Connections API. The authors have installed it in Android terminals and confirmed that a social DTN can successfully be built using this application and that data messages can be exchanged between terminals via reactive routes.

  4. Gain claming in single-pass and double-pass L-band erbium-doped fiber amplifiers

    Harun, S.W.; Ahmad, H.

    2004-01-01

    Gain clamping is demonstrated in single-pass and double-pass long wavelength band erbium-doped fiber amplifiers. A C/L-band wavelength division multiplexing coupler is used in single-pass system to generate a laser at 1566 nm. The gain for the amplifier is clamped at 15.5 dB with gain variation of less than 0.2 dB from input signal power of -40 to -14 dBm with almost negligible noise figure penalty. However, the flatness of gain spectrum is slightly degraded due to the un-optimisation of erbium-doped fiber length. The advantage of this configuration is that the oscillating light does not appear at the output of the amplifier. A highly efficient gain-clamped long wavelength band erbium-doped fiber amplifiers with improved noise figure characteristic is demonstrated by simply adding a broadband conventional band fiber Bragg grating in double pass system. The combination of the fiber Bragg grating and optical circulator has created laser in the cavity for gain clamping. By adjusting the power combination of pumps 1 and 2, the clamped gain level can be controlled. The amplifier gain is clamped at 28.1 dB from -40 to -25 dBm with gain variation of less than 0.5 dB by setting the pumps 1 and 2 at 59.5 and 50.6 mW, respectively. The gain is also flat from 1574 nm to 1604 nm with gain variation of less than 3 dB. The corresponding noise figure varies from 5.6 to 7.6 dB, which is 0.8 to 2.6 dB reduced compared to those of unclamped amplifier (Authors)

  5. Tropical field performance of dual-pass PV tray dryer

    Iskandar, A. Noor; Ya'acob, M. E.; Anuar, M. S.

    2017-09-01

    Solar Photovoltaic technology has become the preferable solution in many countries around the globe to solve the ever increasing energy demand of the consumers. In line with the consumer need, food processing technology has huge potentials of integration with the renewable energy resources especially in drying process which consumes the highest electricity loads. Traditionally, the solar dryer technology was applied in agriculture and food industries utilizing the sun's energy for drying process, but this is highly dependable on the weather condition and surrounding factors. This work shares some field performance of the new design of portable dual-pass PV tray dryer for drying crops in an enclosed system. The dual-pass PV tray dryer encompass a lightweight aluminium box structure with dimensions of 1.1m (L) x 0.6m (W) x 0.2m (H) and can hold a load capacity of 300g - 3kg of crop depending on the types of the crops. Experiments of field performance monitoring were conducted in October -November 2016 which justifies a considerable reduction in time and crops quality improvement when using the dual-pass PV tray dryer as compared to direct-sun drying.

  6. Incremental first pass technique to measure left ventricular ejection fraction

    Kocak, R.; Gulliford, P.; Hoggard, C.; Critchley, M.

    1980-01-01

    An incremental first pass technique was devised to assess the acute effects of any drug on left ventricular ejection fraction (LVEF) with or without a physiological stress. In particular, the effects of the vasodilater isosorbide dinitrate on LVEF before and after exercise were studied in 11 patients who had suffered cardiac failure. This was achieved by recording the passage of sup(99m)Tc pertechnetate through the heart at each stage of the study using a gamma camera computer system. Consistent values for four consecutive first pass values without exercise or drug in normal subjects illustrated the reproducibility of the technique. There was no significant difference between LVEF values obtained at rest and exercise before or after oral isosorbide dinitrate with the exception of one patient with gross mitral regurgitation. The advantages of the incremental first pass technique are that the patient need not be in sinus rhythm, the effects of physiological intervention may be studied and tests may also be repeated at various intervals during long term follow-up of patients. A disadvantage of the method is the limitation in the number of sequential measurements which can be carried out due to the amount of radioactivity injected. (U.K.)

  7. Fish pass assessment by remote control: a novel framework for quantifying the hydraulics at fish pass entrances

    Kriechbaumer, Thomas; Blackburn, Kim; Gill, Andrew; Breckon, Toby; Everard, Nick; Wright, Ros; Rivas Casado, Monica

    2014-05-01

    may distract fish away from fish pass entrances. The initial steps of the framework development have focused on the challenge of precise spatial data referencing in areas with limited sky view to navigation satellites. Platform tracking with a motorised Total Station, various satellite-based positioning solutions and simultaneous localisation and mapping (SLAM) based on stereo images have been tested. The effect of errors in spatial data referencing on ADCP-derived maps of flow features and bathymetry will be quantified through simultaneous deployment of these navigation technologies and the ADCP. This will inform the selection of a cost-effective platform positioning system in practice. Further steps will cover the quantification of uncertainties in ADCP data caused by highly turbulent flows and the identification of suitable ADCP data sampling strategies at fish passes. The final framework for fish pass assessment can contribute to an improved understanding of the interaction of fish and the complex hydraulic river environment.

  8. Text messages as a learning tool for midwives | Woods | South ...

    The use of cell phone text messaging to improve access to continuing ... with 50 of the message recipients, demonstrated that the text messages were well received by ... services, such as the management of HIV-infected children and adults.

  9. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  10. A Message Without a Code?

    Tom Conley

    1981-01-01

    Full Text Available The photographic paradox is said to be that of a message without a code, a communication lacking a relay or gap essential to the process of communication. Tracing the recurrence of Barthes's definition in the essays included in Image/Music/Text and in La Chambre claire , this paper argues that Barthes's definition is platonic in its will to dematerialize the troubling — graphic — immediacy of the photograph. He writes of the image in order to flee its signature. As a function of media, his categories are written in order to be insufficient and inadequate; to maintain an ineluctable difference between language heard and letters seen; to protect an idiom of loss which the photograph disallows. The article studies the strategies of his definition in «The Photographic Paradox» as instrument of abstraction, opposes the notion of code, in an aural sense, to audio-visual markers of closed relay in advertising, and critiques the layout and order of La Chambre claire in respect to Barthes's ideology of absence.

  11. Improved Message Authentication and Confidentiality Checking

    Ismail Jabiullah, M.; Abdullah Al-Shamim, M.; Lutfar Rahman, M.

    2005-01-01

    The most confusing areas of the secured network communications are the message authentication and confidentiality checking. The attacks and the counter measures have become so convoluted that the users in this area begin to account for all contingencies. Two session-key generation techniques are used here to generate two separate session keys K 1 and K 2 ; and both the sender and the reveiver share these keys for higher degree of authentication and confidentiality. For this, the message is first encrypted by the key K 1 , and then the intermediary message authenticatin code (MAC) is generated by encrypting the encrypted message using the key K 2 . Then, the encrypted message and the intermediary MAC is again encrypted by using the K 2 and concatenated with the encrypted message and sent to the destination. At the receiving end, first, the received ciphertext is encrypted by using key K 2 and compared to the received MAC. The received ciphertext again is decrypted by the key K 2 and compared with the first decrypted MAC twice by the key K 2 . The plaintext is obtained by decrypting the received ciphertext first by K 2 and then by K 1 , using the corresponding decryption techniques respectively. The encryption techniques with key K 2 provides the authentication and with key K 1 provides the confidentiality checking of the transmitted message. The developed technique can be applied to both academic and commercial applications in online or offline electronic transactions for security.(authors)

  12. EDITORIAL: Message from the Editor Message from the Editor

    Thomas, Paul

    2010-02-01

    November 2009 and provided particularly detailed advice to the authors. The other three have been very helpful in 'minority fields'. We have excluded our Board members, Guest Editors of special editions and those referees who were already listed in the last four years. Guest Editors' work on papers submitted to their Special Issues is also excluded from consideration. The following people have been selected: Tomonori Takizuka, JAEA-Naka Fusion Institute, Japan Rudolf Neu, Max-Planck-Institut für Plasmaphysik, Germany Sibylle Guenter, Max-Planck-Institut für Plasmaphysik, Germany Taik-Soo Hahm, Princeton Plasma Physics Laboratory, United States David R. Mikkelsen, Princeton Plasma Physics Laboratory, United States Peter C. de Vries, EURATOM/UKAEA Fusion Association, United Kingdom Yasuhiro Suzuki, National Institute for Fusion Science, Japan Jerzy Wolowski, Institute of Plasma Physics and Laser Microfusion, Poland Tetsuo Tanabe, Kyushu University, Japan Yasuyuki Yagi, National Institute of Advanced Industrial Science and Technology, Japan Congratulations and many, many thanks! The Guest Editors of special editions deserve a special mention for the excellent help that they have given us. They are: Taik-Soo Hahm, Princeton Plasma Physics Laboratory, United States, Special Issue on H-Mode Physics and Transport Barriers Yaroslav Kolesnichenko, Institute for Nuclear Research, Ukraine, Special Issue on Energetic Particles in Magnetic Confinement Systems Kimitaka Itoh, National Institute for Fusion Science, Japan and Howard R. Wilson, University of York, UK, Special Issue on Plasma Instabilities Bernhard Unterberg, Forschungszentrum Juelich, Germany, Special Issue on Stochastic Fusion Plasma In addition, there is a group of several hundred referees who have helped us in the past year to maintain the high scientific standard of Nuclear Fusion. At the end of this issue we give the full list of all referees for 2009. Our thanks to them! Authors The winner of the 2009 Nuclear Fusion

  13. Pass-transistor asynchronous sequential circuits

    Whitaker, Sterling R.; Maki, Gary K.

    1989-01-01

    Design methods for asynchronous sequential pass-transistor circuits, which result in circuits that are hazard- and critical-race-free and which have added degrees of freedom for the input signals, are discussed. The design procedures are straightforward and easy to implement. Two single-transition-time state assignment methods are presented, and hardware bounds for each are established. A surprising result is that the hardware realizations for each next state variable and output variable is identical for a given flow table. Thus, a state machine with N states and M outputs can be constructed using a single layout replicated N + M times.

  14. Evaluation of Sexual Communication Message Strategies

    Khan Munziba

    2011-05-01

    Full Text Available Abstract Parent-child communication about sex is an important proximal reproductive health outcome. But while campaigns to promote it such as the Parents Speak Up National Campaign (PSUNC have been effective, little is known about how messages influence parental cognitions and behavior. This study examines which message features explain responses to sexual communication messages. We content analyzed 4 PSUNC ads to identify specific, measurable message and advertising execution features. We then develop quantitative measures of those features, including message strategies, marketing strategies, and voice and other stylistic features, and merged the resulting data into a dataset drawn from a national media tracking survey of the campaign. Finally, we conducted multivariable logistic regression models to identify relationships between message content and ad reactions/receptivity, and between ad reactions/receptivity and parents' cognitions related to sexual communication included in the campaign's conceptual model. We found that overall parents were highly receptive to the PSUNC ads. We did not find significant associations between message content and ad reactions/receptivity. However, we found that reactions/receptivity to specific PSUNC ads were associated with increased norms, self-efficacy, short- and long-term expectations about parent-child sexual communication, as theorized in the conceptual model. This study extends previous research and methods to analyze message content and reactions/receptivity. The results confirm and extend previous PSUNC campaign evaluation and provide further evidence for the conceptual model. Future research should examine additional message content features and the effects of reactions/receptivity.

  15. PASS: a component of Desk Top PA for the WIPP

    Crawford, M.B.; Wilmot, R.D.; Galson, D.A.; Swift, P.N.; Fewell, M.E.

    1998-01-01

    There is a growing recognition internationally of the need to demonstrate comprehensiveness in order to build confidence in performance assessments (PAs) for radioactive waste disposal projects. This has resulted in a number of methodologies being developed to formalize the process of defining and documenting the decision basis that underlies a PA. Such methodologies include process influence diagrams and the rock engineering system (RES) matrix. However, these methodologies focus mainly on the conceptualization of the disposal system and do not provide a ready framework to document the decisions behind the model development and parameterization of the PA system. The Performance Assessment Support System (PASS) is a flexible electronic tool designed to increase the transparency and traceability of decision making in the entire PA process. An application of PASS has been developed for the Waste Isolation Pilot Plant (WIPP) where it forms an important component of Desk Top PA, a PC-based PA computational environment under development at Sandia National Laboratories to document, plan, and support management decisions and to assess performance for the WIPP recertification process. This desk-top PA environment is also aimed at providing scientifically-based decision support for assessing the performance of nuclear and hazardous waste management and environmental clean-up systems

  16. A Low-Complexity Joint Detection-Decoding Algorithm for Nonbinary LDPC-Coded Modulation Systems

    Wang, Xuepeng; Bai, Baoming; Ma, Xiao

    2010-01-01

    In this paper, we present a low-complexity joint detection-decoding algorithm for nonbinary LDPC codedmodulation systems. The algorithm combines hard-decision decoding using the message-passing strategy with the signal detector in an iterative manner. It requires low computational complexity, offers good system performance and has a fast rate of decoding convergence. Compared to the q-ary sum-product algorithm (QSPA), it provides an attractive candidate for practical applications of q-ary LDP...

  17. Performance of large-scale scientific applications on the IBM ASCI Blue-Pacific system

    Mirin, A.

    1998-01-01

    The IBM ASCI Blue-Pacific System is a scalable, distributed/shared memory architecture designed to reach multi-teraflop performance. The IBM SP pieces together a large number of nodes, each having a modest number of processors. The system is designed to accommodate a mixed programming model as well as a pure message-passing paradigm. We examine a number of applications on this architecture and evaluate their performance and scalability

  18. Dr Math Rocks!: Using instant messaging to help pupils with mathematics homework

    Butgereit, LL

    2008-05-01

    Full Text Available Mathematics education in South Africa needs help. This paper describes a project where school aged pupils could get help with their mathematics homework using MXit, South Africa's most popular instant messaging system, on their cell phones...

  19. When message-frame fits salient cultural-frame, messages feel more persuasive.

    Uskul, Ayse K; Oyserman, Daphna

    2010-03-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a message about health risks of caffeine consumption among individuals prescreened to be regular caffeine consumers. After being primed for individualism, European Americans who read a health message that focused on the personal self were more likely to accept the message-they found it more persuasive, believed they were more at risk and engaged in more message-congruent behaviour. These effects were also found among Asian Americans who were primed for collectivism and who read a health message that focused on relational obligations. The findings point to the importance of investigating the role of situational cues in persuasive effects of health messages and suggest that matching content to primed frame consistent with the chronic frame may be a way to know what to match messages to.

  20. Global Positioning System Disaster Notification Messaging Service

    2013-09-01

    jammer.” In early 2013, a team from MIT with the cooperation of a witting yacht crew performed a proof of concept navigation attack as if a malicious...attacker were spoofing GPS. GPS signals were slowly overpowered with a compilation of artificial signals which successfully steered the yacht 100...2013, July 30). Students hijack luxury yacht with GPS spoofing. Retrieved from SC magazine website http://www.scmagazine.com.au/News/ Schnabel, J

  1. Comment ameliorer la selection et le traitement des messages verbaux? (How to Improve the Selection and Processing of Verbal Messages)

    Rivenez, Marie; Darwin, Chris; Guillaume, Anne

    2005-01-01

    L'objectif de cette recherche est d'ameliorer la selection des messages verbaux. Nous cherchons a determiner les facteurs influencant le traitement d'un message verbal lorsque l'attention est portee sur un autre message...

  2. Fabrication of seamless calandria tubes by cold pilgering route using 3-pass and 2-pass schedules

    Saibaba, N.

    2008-12-01

    Calandria tube is a large diameter, extremely thin walled zirconium alloy tube which has diameter to wall thickness ratio as high as 90-95. Such tubes are conventionally produced by the 'welded route', which involves extrusion of slabs followed by a series of hot and cold rolling passes, intermediate anneals, press forming of sheets into circular shape and closing the gap by TIG welding. Though pilgering is a well established process for the fabrication of seamless tubes, production of extremely thin walled tubes offers several challenges during pilgering. Nuclear fuel complex (NFC), Hyderabad, has successfully developed a process for the production of Zircaloy-4 calandria tubes by adopting the 'seamless route' which involves hot extrusion of mother blanks followed by three-pass pilgering or two-pass pilgering schedules. This paper deals with standardization of the seamless route processes for fabrication of calandria tubes, comparison between the tubes produced by 2-pass and 3-pass pilgering schedules, role of ultrasonic test charts for control of process parameters, development of new testing methods for burst testing and other properties.

  3. Fabrication of seamless calandria tubes by cold pilgering route using 3-pass and 2-pass schedules

    Saibaba, N.

    2008-01-01

    Calandria tube is a large diameter, extremely thin walled zirconium alloy tube which has diameter to wall thickness ratio as high as 90-95. Such tubes are conventionally produced by the 'welded route', which involves extrusion of slabs followed by a series of hot and cold rolling passes, intermediate anneals, press forming of sheets into circular shape and closing the gap by TIG welding. Though pilgering is a well established process for the fabrication of seamless tubes, production of extremely thin walled tubes offers several challenges during pilgering. Nuclear fuel complex (NFC), Hyderabad, has successfully developed a process for the production of Zircaloy-4 calandria tubes by adopting the 'seamless route' which involves hot extrusion of mother blanks followed by three-pass pilgering or two-pass pilgering schedules. This paper deals with standardization of the seamless route processes for fabrication of calandria tubes, comparison between the tubes produced by 2-pass and 3-pass pilgering schedules, role of ultrasonic test charts for control of process parameters, development of new testing methods for burst testing and other properties

  4. Common pass decentered annular ring resonator

    Holmes, D. A.; Waite, T. R.

    1985-04-30

    An optical resonator having an annular cylindrical gain region for use in a chemical laser or the like in which two ring-shaped mirrors having substantially conical reflecting surfaces are spaced apart along a common axis of revolution of the respective conical surfaces. A central conical mirror reflects incident light directed along said axis radially outwardly to the reflecting surface of a first one of the ring-shaped mirrors. The radial light rays are reflected by the first ring mirror to the second ring mirror within an annular cylindrical volume concentric with said common axis and forming a gain region. Light rays impinging on the second ring mirror are reflected to diametrically opposite points on the same conical mirror surfaces and back to the first ring mirror through the same annular cylindrical volume. The return rays are then reflected by the conical mirror surface of the first ring mirror back to the central conical mirror. The mirror surfaces are angled such that the return rays are reflected back along the common axis by the central mirror in a concentric annular cylindrical volume. A scraper mirror having a central opening centered on said axis and an offset opening reflects all but the rays passing through the two openings in an output beam. The rays passing through the second opening are reflected back through the first opening to provide feedback.

  5. An experimental evaluation of multi-pass solar air heaters

    Satcunanathan, S.; Persad, P.

    1980-12-01

    Three collectors of identical dimensions but operating in the single-pass, two-pass and three-pass modes were tested simultaneously under ambient conditions. It was found that the two-pass air heater was consistently better than the single-pass air heater over the day for the range of mass flow rates considered. It was also found that at a mass flow rate of 0.0095 kg s/sup -1/ m/sup -2/, the thermal performances of the two-pass and three-pass collectors were identical, but at higher flow rates the two-pass collector was superior to the three-pass collector, the superiority decreasing with increasing mass flow rate.

  6. Mobile phone messaging reminders for attendance at healthcare appointments.

    Car, Josip; Gurol-Urganci, Ipek; de Jongh, Thyra; Vodopivec-Jamsek, Vlasta; Atun, Rifat

    2012-07-11

    Missed appointments are a major cause of inefficiency in healthcare delivery, with substantial monetary costs for the health system, leading to delays in diagnosis and appropriate treatment. Patients' forgetfulness is one of the main reasons for missed appointments, and reminders may help alleviate this problem. Modes of communicating reminders for appointments to patients include face-to-face communication, postal messages, calls to landlines or mobile phones, and mobile phone messaging. Mobile phone messaging applications such as Short Message Service (SMS) and Multimedia Message Service (MMS) could provide an important, inexpensive delivery medium for reminders for healthcare appointments. To assess the effects of mobile phone messaging reminders for attendance at healthcare appointments. Secondary objectives include assessment of patients' and healthcare providers' evaluation of the intervention; costs; and possible risks and harms associated with the intervention. We searched the Cochrane Central Register of Controlled Trials (CENTRAL,The Cochrane Library 2009, Issue 2), MEDLINE (OvidSP) (January 1993 to June 2009), EMBASE (OvidSP) (January 1993 to June 2009), PsycINFO (OvidSP) (January 1993 to June 2009), CINAHL (EbscoHOST) (January 1993 to June 2009), LILACS (January 1993 to June 2009) and African Health Anthology (January 1993 to June 2009). We also reviewed grey literature (including trial registers) and reference lists of articles. We included randomised controlled trials (RCTs), quasi-randomised controlled trials (QRCTs), controlled before-after (CBA) studies, or interrupted time series (ITS) studies with at least three time points before and after the intervention. We included studies assessing mobile phone messaging as reminders for healthcare appointments. We only included studies in which it was possible to assess effects of mobile phone messaging independent of other technologies or interventions.   Two review authors independently assessed all

  7. Managing Gradual Typing with Message-Safety in Dart

    Ernst, Erik; Møller, Anders; Schwarz, Mathias Romme

    . This supports evolution from a dynamically typed programto a strictly statically typed form. We present a formal model of Dart that elucidates how a core of the language and its standard type system works. This allows us to characterize message-safe programs and present a theorem stating that such programs......This paper establishes a notion of message-safe programs as a natural intermediate point between dynamically typed and statically typed Dart programs. Unlike traditional static type checking, the type system in the Dart programming language is unsound by design. The rationale has been...... that this allows compile-time detection of likely errors and enables code completion in integrated development environments, without being restrictive on programmers. We show that, despite unsoundness, judicious use of type annotations can ensure useful properties of the runtime behavior of Dart programs...

  8. Anxiety, Construct Differentiation, and Message Production.

    Shepherd, Gregory J.; Condra, Mollie B.

    1989-01-01

    Examines the nature of the construct differentiation/anxiety relationship in light of messages produced. Considers recent and complex conceptualizations of social-cognitive development and anxiety. Finds no significant relationship between state anxiety and construct differentiation. (MM)

  9. Safety message broadcast in vehicular networks

    Bi, Yuanguo; Zhuang, Weihua; Zhao, Hai

    2017-01-01

    This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast. Along with an overall overview of the architecture, characteristics, and applications of vehicular networks, the authors discuss the challenging issues in the research on performance improvement for safety applications, and provide a comprehensive review of the research literature. A cross layer broadcast protocol is included to support efficient safety message broadcast by jointly considering geographical location, physical-layer channel condition, and moving velocity of vehicles in the highway scenario. To further support multi-hop safety message broadcast in a complex road layout, the authors propose an urban multi-hop broadcast protocol that utilizes a novel forwarding node selection scheme. Additionally, a busy tone based medium access control scheme is designed to provide strict priority to safety applications in vehicle...

  10. Photometric requirements for portable changeable message signs.

    2001-09-01

    This project reviewed the performance of pchangeable message signs (PCMSs) and developed photometric standards to establish performance requirements. In addition, researchers developed photometric test methods and recommended them for use in evaluati...

  11. Wyoming CV Pilot Traveler Information Message Sample

    Department of Transportation — This dataset contains a sample of the sanitized Traveler Information Messages (TIM) being generated by the Wyoming Connected Vehicle (CV) Pilot. The full set of TIMs...

  12. Getting the message across: age differences in the positive and negative framing of health care messages.

    Shamaskin, Andrea M; Mikels, Joseph A; Reed, Andrew E

    2010-09-01

    Although valenced health care messages influence impressions, memory, and behavior (Levin, Schneider, & Gaeth, 1998) and the processing of valenced information changes with age (Carstensen & Mikels, 2005), these 2 lines of research have thus far been disconnected. This study examined impressions of, and memory for, positively and negatively framed health care messages that were presented in pamphlets to 25 older adults and 24 younger adults. Older adults relative to younger adults rated positive pamphlets more informative than negative pamphlets and remembered a higher proportion of positive to negative messages. However, older adults misremembered negative messages to be positive. These findings demonstrate the age-related positivity effect in health care messages with promise as to the persuasive nature and lingering effects of positive messages. (c) 2010 APA, all rights reserved.

  13. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  14. Using Text Messages for Critical Real-time Data Capture in the ANISA Study.

    Islam, Mohammad Shahidul; Rahman, Qazi Sadeq-ur; Hossain, Tanvir; Connor, Nicholas E; Hossain, Belal; Rahman, Md Mahmudur; Neogi, Ranjan; Saha, Samir K; El Arifeen, Shams

    2016-05-01

    The Aetiology of Neonatal Infection in South Asia (ANISA) study takes advantage of text messaging technology to record information required for randomizing the study population into a control subcohort. The text message system is also used for monitoring various study activities. When a child-health worker registers a newborn in the study, she sends a text message to a database server containing the study identification number and newborn's age at the time of registration. For each possible serious bacterial infection case, a study physician also sends a text message to the same server with the age of the young infant at the time of illness assessment. Using this information, a computer-based algorithm randomizes the newborn into a control subcohort. Text messages are also sent to alert the study physicians and study supervisors of a possible serious bacterial infection case being referred to health-care facilities. Phlebotomists working at remote specimen collection sites send text messages to the site laboratory personnel before sending the specimens through porters. Real-time data entry and monitoring are challenging for any population-based study conducted in remote areas. Our text messaging system provides an opportunity to overcome this barrier where availability of data entry facilities is limited.

  15. Message-driven factors influencing opening and forwarding of mobile advertising messages

    Sanz Blas, Silvia; Ruiz Mafé, Carla; Martí Parreño, José

    2015-01-01

    This work aims to analyse the influence of message-driven factors -informativeness, ubiquity, frequency and personalization- on consumer attitude and behaviour -opening and forwarding- towards mobile advertising messages. A theoretical model was developed and empirically tested using a sample of 355 Spanish teenager mobile users. Findings show that frequency is the dimension accounting the most -and significantly- of the four message-driven factors analysed on attitude toward mobile advertisi...

  16. When message-frame fits salient cultural-frame, messages feel more persuasive

    Uskul, Ayse K.; Oyserman, Daphna

    2010-01-01

    The present study examines the persuasive effects of tailored health messages comparing those tailored to match (versus not match) both chronic cultural frame and momentarily salient cultural frame. Evidence from two studies (Study 1: n = 72 European Americans; Study 2: n = 48 Asian Americans) supports the hypothesis that message persuasiveness increases when chronic cultural frame, health message tailoring and momentarily salient cultural frame all match. The hypothesis was tested using a me...

  17. Persuasive messages. Development of persuasive messages may help increase mothers' compliance of their children's immunization schedule.

    Gore, P; Madhavan, S; Curry, D; McClurg, G; Castiglia, M; Rosenbluth, S A; Smego, R A

    1998-01-01

    Effective immunization campaigns can be designed by determining which persuasion strategy is most effective in attracting the attention of mothers of preschoolers. The authors assess the impact of three persuasional strategies: fear-arousal, motherhood-arousal, and rational messages, on mothers of preschoolers who are late for their immunizations. The fear-arousal message was found to be most effective, followed by the motherhood-arousal, and then the rational message, in attracting mothers' attention to their child's immunization status.

  18. Improving Type Error Messages in OCaml

    Arthur Charguéraud

    2015-12-01

    Full Text Available Cryptic type error messages are a major obstacle to learning OCaml or other ML-based languages. In many cases, error messages cannot be interpreted without a sufficiently-precise model of the type inference algorithm. The problem of improving type error messages in ML has received quite a bit of attention over the past two decades, and many different strategies have been considered. The challenge is not only to produce error messages that are both sufficiently concise and systematically useful to the programmer, but also to handle a full-blown programming language and to cope with large-sized programs efficiently. In this work, we present a modification to the traditional ML type inference algorithm implemented in OCaml that, by significantly reducing the left-to-right bias, allows us to report error messages that are more helpful to the programmer. Our algorithm remains fully predictable and continues to produce fairly concise error messages that always help making some progress towards fixing the code. We implemented our approach as a patch to the OCaml compiler in just a few hundred lines of code. We believe that this patch should benefit not just to beginners, but also to experienced programs developing large-scale OCaml programs.

  19. Recent computer attacks via Instant Messaging

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  20. Gender messages in contemporary popular Malay songs

    Collin Jerome

    2013-07-01

    Full Text Available Gender has been an important area of research in the field of popular music studies. Numerous scholars have found that contemporary popular music functions as a locus of diverse constructions and expressions of gender. While most studies focus on content analyses of popular music, there is still a need for more research on audience’s perception of popular music’s messages. This study examined adult Malay listeners’ perceptions of gender messages in contemporary Malay songs. A total of 16 contemporary Malay songs were analysed using Fairclough’s (1992 method of text analysis. The content of the songs that conveyed messages about gender were the basis for analysis. The results showed that the messages revolve mainly around socially constructed gender roles and expectations in romantic relationships. Gender stereotypes are also used in the songs to reinforce men’s and women’s roles in romantic relationships. The results also showed that, while listeners acknowledge the songs’ messages about gender, their own perceptions of gender and what it means to be a gendered being in today’s world are neither represented nor discussed fully in the songs analysed. It is hoped the findings from this, particularly the mismatch between projected and perceived notions of gender, contribute to the field of popular Malay music studies in particular, and popular music studies in general where gender messages in popular songs and their influence on listeners’ perceptions of their own gender is concerned.

  1. Quantum signature scheme for known quantum messages

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  2. Proximity-Based Asynchronous Messaging Platform for Location-Based Internet of Things Service

    Hyeong gon Jo

    2016-07-01

    Full Text Available The Internet of Things (IoT opens up tremendous opportunities to provide location-based applications. However, despite the services around a user being physically adjacent, common IoT platforms use a centralized structure, like a cloud-computing architecture, which transfers large amounts of data to a central server. This raises problems, such as traffic concentration, long service latency, and high communication cost. In this paper, we propose a physical distance-based asynchronous messaging platform that specializes in processing personalized data and location-based messages. The proposed system disperses traffic using a location-based message-delivery protocol, and has high stability.

  3. An Approach to Ad-hoc Messaging Networks Using Time Shifted Propagation

    Christoph Fuchß

    2007-10-01

    Full Text Available Many communication devices, like mobile phones and PDAs, are enabled for near field communication by using Bluetooth. Many approaches dealt so far with the attempt to transfer mobile ad-hoc networks (MANET to the mechanism of the “fixed internet” to mobile networks. In order to achieve liability and robustness of common TCP connections routing algorithm in near field communication based networks become more sophisticated and complex. These mechanisms often do not reflect on the application’s particularities.Our approach of an ad-hoc messaging network (AMNET uses simple store-and-forward message passing to spread data asynchronously. We do not aim at the reliability of common internet networks but focus on application specific needs that can be covered by simple message passing mechanism. In this paper we will portray a powerful network by using simple devices and communication protocols on the basis of AMNETs. Simulation results of our AMNET approach provide insights towards speeding up the network setup process and to enable the use of AMNETs even with few participants by introducing a hybrid structure of infrastructure and mobile nodes.

  4. The Pension Fund passes important milestones

    2012-01-01

    In this column, the Chairman of the Pension Fund Governing Board (PFGB) presents the Board's latest main decisions, initiatives and accomplishments to the Fund's members and beneficiaries.   Since my last report in October, the PFGB has passed several milestones in actuarial, technical and investment matters. The PFGB has completed an analysis of a request by the European Organisation for Astronomical Research in the Southern Hemisphere (ESO) to reduce the increased cost of pension insurance for new ESO recruits that has been caused by the increased CHF/€ exchange ratio. Currently the staff of ESO are admitted to the CERN Pension Fund, pursuant to a co-operation agreement between CERN and ESO dating back to 1968. This analysis assessed the actuarial, financial, administrative and legal implications, and is scheduled to be presented to the CERN Council and the Finance Committee in December. After an open tendering process the PFGB has selected Buck Consultants Limited...

  5. The baton passes to the LHC

    CERN Bulletin

    2011-01-01

    Held in the picturesque mountain setting of La Thuile in the Italian Alps, the international conference “Rencontres de Moriond” showed how the baton of discovery in the field of high-energy physics is definitely passing to the LHC experiments. In the well-known spirit of Moriond, the conference was an important platform for young students to present their latest results. The Higgs boson might well be within reach this year and the jet-quenching phenomenon might reveal new things soon…   New physics discussed over the Italian Alps during the "Les rencontres de Moriond" conference.  (Photographer: Paul Gerritsen. Adapted by Katarina Anthony) Known by physicists as one of the most important winter conferences, “Les rencontres de Moriond” are actually a series of conferences spread over two weeks covering the main themes of electroweak interactions, QCD and high-energy interactions, cosmology, gravitation, astropar...

  6. Heartbeat-based error diagnosis framework for distributed embedded systems

    Mishra, Swagat; Khilar, Pabitra Mohan

    2012-01-01

    Distributed Embedded Systems have significant applications in automobile industry as steer-by-wire, fly-by-wire and brake-by-wire systems. In this paper, we provide a general framework for fault detection in a distributed embedded real time system. We use heartbeat monitoring, check pointing and model based redundancy to design a scalable framework that takes care of task scheduling, temperature control and diagnosis of faulty nodes in a distributed embedded system. This helps in diagnosis and shutting down of faulty actuators before the system becomes unsafe. The framework is designed and tested using a new simulation model consisting of virtual nodes working on a message passing system.

  7. Retail Bank Interest Rate Pass-Through; Is Chile Atypical?

    Alessandro Rebucci; Marco A Espinosa-Vega

    2003-01-01

    This paper investigates empirically the pass-through of money market interest rates to retail banking interest rates in Chile, the United States, Canada, Australia, New Zealand, and five European countries. Overall, Chile's pass-through does not appear atypical. Based on a standard error-correction model, we find that, as in most countries considered, Chile's measured pass-through is incomplete. But Chile's pass-through is also faster than in many other countries considered and is comparable ...

  8. Comparing tailored and untailored text messages for smoking cessation

    Skov-Ettrup, L S; Ringgaard, L W; Dalum, P

    2014-01-01

    The aim was to compare the effectiveness of untailored text messages for smoking cessation to tailored text messages delivered at a higher frequency. From February 2007 to August 2009, 2030 users of an internet-based smoking cessation program with optional text message support aged 15-25 years were...... of text messages increases quit rates among young smokers....

  9. Complete genes may pass from food to human blood

    Spisák, Sándor; Solymosi, Norbert; Ittzés, Péter

    2013-01-01

    Our bloodstream is considered to be an environment well separated from the outside world and the digestive tract. According to the standard paradigm large macromolecules consumed with food cannot pass directly to the circulatory system. During digestion proteins and DNA are thought to be degraded...... into small constituents, amino acids and nucleic acids, respectively, and then absorbed by a complex active process and distributed to various parts of the body through the circulation system. Here, based on the analysis of over 1000 human samples from four independent studies, we report evidence that meal......-derived DNA fragments which are large enough to carry complete genes can avoid degradation and through an unknown mechanism enter the human circulation system. In one of the blood samples the relative concentration of plant DNA is higher than the human DNA. The plant DNA concentration shows a surprisingly...

  10. Remote control of data acquisition devices by means of message oriented middleware

    Sanchez, E.; Portas, A.; Pereira, A.; Vega, J.; Kirpitchev, I.

    2007-01-01

    The TJ-II autonomous acquisition systems are computers running dedicated applications for programming and controlling data acquisition channels and also integrating acquired data into the central database. These computers are located in the experimental hall and have to be remotely controlled during plasma discharges. A remote control for these systems has been implemented by taking advantage of the message-oriented middleware recently introduced into the TJ-II data acquisition system. Java Message Service (JMS) is used as the messaging application program interface. All the acquisition actions that are available through the system console of the data acquisition computers (starting or aborting an acquisition, restarting the system or updating the acquisition application) can now be initiated remotely. Command messages are sent to the acquisition systems located in the experimental hall close to the TJ-II device by using the messaging software, without having to use a remote desktop application that produces heavy network traffic and requires manual operation. Action commands can be sent to only one or to several/many acquisition systems at the same time. This software is integrated into the TJ-II remote participation system and the acquisition systems can be commanded from inside or outside the laboratory. All this software is integrated into the security framework provided by PAPI, thus preventing non-authorized users commanding the acquisition computers. In order to dimension and distribute messaging services some performance tests of the message oriented middleware software have been carried out. Results of the tests are presented. As suggested by the tests results different transport connectors are used: TCP transport protocol is used for the local environment, while HTTP protocol is used for remote accesses, thereby allowing the system performance to be optimized

  11. Remote control of data acquisition devices by means of message oriented middleware

    Sanchez, E. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain)], E-mail: edi.sanchez@ciemat.es; Portas, A.; Pereira, A.; Vega, J.; Kirpitchev, I. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain)

    2007-10-15

    The TJ-II autonomous acquisition systems are computers running dedicated applications for programming and controlling data acquisition channels and also integrating acquired data into the central database. These computers are located in the experimental hall and have to be remotely controlled during plasma discharges. A remote control for these systems has been implemented by taking advantage of the message-oriented middleware recently introduced into the TJ-II data acquisition system. Java Message Service (JMS) is used as the messaging application program interface. All the acquisition actions that are available through the system console of the data acquisition computers (starting or aborting an acquisition, restarting the system or updating the acquisition application) can now be initiated remotely. Command messages are sent to the acquisition systems located in the experimental hall close to the TJ-II device by using the messaging software, without having to use a remote desktop application that produces heavy network traffic and requires manual operation. Action commands can be sent to only one or to several/many acquisition systems at the same time. This software is integrated into the TJ-II remote participation system and the acquisition systems can be commanded from inside or outside the laboratory. All this software is integrated into the security framework provided by PAPI, thus preventing non-authorized users commanding the acquisition computers. In order to dimension and distribute messaging services some performance tests of the message oriented middleware software have been carried out. Results of the tests are presented. As suggested by the tests results different transport connectors are used: TCP transport protocol is used for the local environment, while HTTP protocol is used for remote accesses, thereby allowing the system performance to be optimized.

  12. Social dominance orientation moderates the effectiveness of mindset messages.

    Hoyt, Crystal L; B Forsyth, Rachel; Burnette, Jeni L

    2018-04-01

    In this work, we examine whether differences in social dominance orientation (SDO) moderate the effectiveness of mindsets of intelligence messages. We suggest that SDO is a foundational ideological belief system, on which individuals vary, that maintains the desire to endorse fixed beliefs about the nature of human intelligence. Thus, attempts to change individuals' mindsets should be met with resistance from those who strongly endorse the social dominance ideology - individuals high on SDO. In contrast, individuals low on SDO are less likely to use mindsets of intelligence to justify an ideological belief system, and thus, mindset manipulations should be effective for them. We test these predictions across three experimental studies (N Study1  = 271, N Study2  = 207, N Study3  = 313). Across the studies, we find that individuals who are high, relative to low, on SDO have more fixed beliefs about the nature of intelligence and show smaller effects of manipulations of mindsets. However, when comparing to a control condition, there was no evidence that high-SDO participants resisted the growth message that contradicts their ideology more than the fixed one that supports it; additionally, low-SDO participants showed heightened responsiveness to a fixed message. We discuss implications for theoretical advances in our understanding of mindsets. © 2018 The British Psychological Society.

  13. 'Yeast mail': a novel Saccharomyces application (NSA) to encrypt messages.

    Rosemeyer, Helmut; Paululat, Achim; Heinisch, Jürgen J

    2014-09-01

    The universal genetic code is used by all life forms to encode biological information. It can also be used to encrypt semantic messages and convey them within organisms without anyone but the sender and recipient knowing, i.e., as a means of steganography. Several theoretical, but comparatively few experimental, approaches have been dedicated to this subject, so far. Here, we describe an experimental system to stably integrate encrypted messages within the yeast genome using a polymerase chain reaction (PCR)-based, one-step homologous recombination system. Thus, DNA sequences encoding alphabetical and/or numerical information will be inherited by yeast propagation and can be sent in the form of dried yeast. Moreover, due to the availability of triple shuttle vectors, Saccharomyces cerevisiae can also be used as an intermediate construction device for transfer of information to either Drosophila or mammalian cells as steganographic containers. Besides its classical use in alcoholic fermentation and its modern use for heterologous gene expression, we here show that baker's yeast can thus be employed in a novel Saccharomyces application (NSA) as a simple steganographic container to hide and convey messages. Copyright © 2014 Verlag Helvetica Chimica Acta AG, Zürich.

  14. Art messaging to engage homeless young adults.

    Nyamathi, Adeline; Slagle, Alexandra; Thomas, Alexandra; Hudson, Angela; Kahilifard, Farinaz; Avila, Glenna; Orser, Julie; Cuchilla, Manuel

    2011-01-01

    Art has been shown to be an empowering and engaging entity with numerous benefits to vulnerable populations, including the homeless persons and young adults. However, little is known how homeless young adults perceive the use of art as messages that can communicate the danger of initiating or continuing drug and alcohol use. The purpose of this study was to solicit perspectives of homeless, drug-using young adults as to how art can be used to design messages for their peers about the danger of initiating or continuing drug and alcohol use. Qualitative methodology via focus group discussions was utilized to engage 24 homeless young adults enrolled from a drop-in site in Santa Monica, California. The findings revealed support for a myriad of delivery styles, including in-person communication, flyers, music, documentary film, and creative writing. The young adults also provided insight into the importance of the thematic framework of messages. Such themes ranged from empowering and hopeful messages to those designed to scare young homeless adults into not experimenting with drugs. The findings indicate that in addition to messages communicating the need to prevent or reduce drug and alcohol use, homeless young adults respond to messages that remind them of goals and dreams they once had for their future, and to content that is personal, real, and truthful. Our research indicates that messages that reinforce protective factors such as hope for the future and self-esteem may be as important to homeless young adults as information about the risks and consequences of drug use.

  15. 36 CFR 13.918 - Sable Pass Wildlife Viewing Area.

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Sable Pass Wildlife Viewing... Preserve General Provisions § 13.918 Sable Pass Wildlife Viewing Area. (a) Entry into the Sable Pass Wildlife Viewing Area is prohibited from May 1 to September 30 unless authorized by the Superintendent. (b...

  16. PASS Student Leader and Mentor Roles: A Tertiary Leadership Pathway

    Skalicky, Jane; Caney, Annaliese

    2010-01-01

    In relation to developing leadership skills during tertiary studies, this paper considers the leadership pathway afforded by a Peer Assisted Study Sessions (PASS) program which includes the traditional PASS Leader role and a more senior PASS Mentor role. Data was collected using a structured survey with open-ended questions designed to capture the…

  17. Incorporating Pass-Phrase Dependent Background Models for Text-Dependent Speaker verification

    Sarkar, Achintya Kumar; Tan, Zheng-Hua

    2018-01-01

    -dependent. We show that the proposed method significantly reduces the error rates of text-dependent speaker verification for the non-target types: target-wrong and impostor-wrong while it maintains comparable TD-SV performance when impostors speak a correct utterance with respect to the conventional system......In this paper, we propose pass-phrase dependent background models (PBMs) for text-dependent (TD) speaker verification (SV) to integrate the pass-phrase identification process into the conventional TD-SV system, where a PBM is derived from a text-independent background model through adaptation using...... the utterances of a particular pass-phrase. During training, pass-phrase specific target speaker models are derived from the particular PBM using the training data for the respective target model. While testing, the best PBM is first selected for the test utterance in the maximum likelihood (ML) sense...

  18. An Investigation of the Impact of an Intervention to Reduce Academic Procrastination Using Short Message Service (SMS) Technology

    Davis, Darrel R.; Abbitt, Jason T.

    2013-01-01

    This mixed-method pilot study investigated the impact of a custom Short Message Service (SMS) reminder system developed to help students reduce procrastination and increase performance on weekly content-related quizzes in a high-enrollment hybrid online course. Text message reminders were sent to three students with high procrastination and low…

  19. Emotional flow in persuasive health messages.

    Nabi, Robin L

    2015-01-01

    Overwhelmingly, the literature on the persuasive influence of emotions has focused on individual emotions, fear in particular, though some recent attention has been given to mixed emotions in persuasive appeals. Building on this newer wave of research, this article argues that instead of focusing on singular emotional states or collections of emotions evoked by a message, it might prove valuable to explore the flow, or evolution, of emotional experience over the course of exposure to a health message. The article offers a brief introduction to the concept of emotion, followed by a review of the state of the literature on the use of emotion in health messages. The concept of emotional flow is then introduced along with a consideration of how it has been tacitly incorporated into the study of emotional health messages. Finally, the utility of the concept of emotional flow is elaborated by articulating the ways in which it might be harnessed to facilitate the creation of more effective health messages, individually as well as across campaigns. The article concludes with an agenda for future research.

  20. Effects of Electronic Word - of - Mouth Messages

    Choong Hoon Lim

    2012-01-01

    Full Text Available With the increased usage of online technologies, there has been an escalation of Electronic Word - of –Mouth (eWOM messages related to sport products and services offered and consumed. Therefore, in this original investigation by applying eWOM to the sport industry, this study examined how the combination of the quality of the eWOM message and the provider of the eWOM message affects purchaseintentions depending on the expertise level of the consumer. This study – which involved the collection of data from 134 students at a large university situated in the Midwest of the United States – utilized repeated measures of Analysis of Variance (ANOVA with tripartite groups of expertise and experimental conditions as independent variables. Purchase intention was the dependent variables. The results indicated that the quality of the eWOM message moderated the effect of the provider of the eWOM message. The subject’s level of expertise also had a moderating role on purchase intention.