WorldWideScience

Sample records for modeling computer communication

  1. A Spatial Communication Model for Ubiquitous Computing Services

    Directory of Open Access Journals (Sweden)

    Ichiro Satoh

    2008-04-01

    Full Text Available The paper presents a location-aware communication approach in smart home environments. It is constructed on a symbolic location model to represent the containment relationships between physical objects, computing devices, and places. It enables people and devices to discover and connect with their communication partners according to their co-locations. It also provides non-smart objects, including home appliances, everyday objects, and places, with virtual counterpart, which are not only their representations but also work as proxies of their targets. This paper presents the design for this approach and describes its implementation and applications.

  2. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  3. A performance model for the communication in fast multipole methods on high-performance computing platforms

    KAUST Repository

    Ibeid, Huda

    2016-03-04

    Exascale systems are predicted to have approximately 1 billion cores, assuming gigahertz cores. Limitations on affordable network topologies for distributed memory systems of such massive scale bring new challenges to the currently dominant parallel programing model. Currently, there are many efforts to evaluate the hardware and software bottlenecks of exascale designs. It is therefore of interest to model application performance and to understand what changes need to be made to ensure extrapolated scalability. The fast multipole method (FMM) was originally developed for accelerating N-body problems in astrophysics and molecular dynamics but has recently been extended to a wider range of problems. Its high arithmetic intensity combined with its linear complexity and asynchronous communication patterns make it a promising algorithm for exascale systems. In this paper, we discuss the challenges for FMM on current parallel computers and future exascale architectures, with a focus on internode communication. We focus on the communication part only; the efficiency of the computational kernels are beyond the scope of the present study. We develop a performance model that considers the communication patterns of the FMM and observe a good match between our model and the actual communication time on four high-performance computing (HPC) systems, when latency, bandwidth, network topology, and multicore penalties are all taken into account. To our knowledge, this is the first formal characterization of internode communication in FMM that validates the model against actual measurements of communication time. The ultimate communication model is predictive in an absolute sense; however, on complex systems, this objective is often out of reach or of a difficulty out of proportion to its benefit when there exists a simpler model that is inexpensive and sufficient to guide coding decisions leading to improved scaling. The current model provides such guidance.

  4. Data and computer communications

    Energy Technology Data Exchange (ETDEWEB)

    Stallings, W.

    1985-01-01

    The book clarifies and differentiates concepts underlying the field of data and computer communications. It is divided into three parts: 1. Data Communications which is concerned with the exchange of data between two directly connected devices. Within this environment, aspects of transmission, interfacing, link control, and multiplexing are examined. 2. Data Communication Networking - this part examines the internal mechanisms by which communication networks provide a data transfer service for attached devices. 3. Communications Architecture - this part explores the architectural principles and the specific mechanisms required for the exchange of data among computers, terminals and other data processing devices.

  5. Stochastic data-flow graph models for the reliability analysis of communication networks and computer systems

    Energy Technology Data Exchange (ETDEWEB)

    Chen, D.J.

    1988-01-01

    The literature is abundant with combinatorial reliability analysis of communication networks and fault-tolerant computer systems. However, it is very difficult to formulate reliability indexes using combinatorial methods. These limitations have led to the development of time-dependent reliability analysis using stochastic processes. In this research, time-dependent reliability-analysis techniques using Dataflow Graphs (DGF) are developed. The chief advantages of DFG models over other models are their compactness, structural correspondence with the systems, and general amenability to direct interpretation. This makes the verification of the correspondence of the data-flow graph representation to the actual system possible. Several DGF models are developed and used to analyze the reliability of communication networks and computer systems. Specifically, Stochastic Dataflow graphs (SDFG), both the discrete-time and the continuous time models are developed and used to compute time-dependent reliability of communication networks and computer systems. The repair and coverage phenomenon of communication networks is also analyzed using SDFG models.

  6. Hyperswitch Communication Network Computer

    Science.gov (United States)

    Peterson, John C.; Chow, Edward T.; Priel, Moshe; Upchurch, Edwin T.

    1993-01-01

    Hyperswitch Communications Network (HCN) computer is prototype multiple-processor computer being developed. Incorporates improved version of hyperswitch communication network described in "Hyperswitch Network For Hypercube Computer" (NPO-16905). Designed to support high-level software and expansion of itself. HCN computer is message-passing, multiple-instruction/multiple-data computer offering significant advantages over older single-processor and bus-based multiple-processor computers, with respect to price/performance ratio, reliability, availability, and manufacturing. Design of HCN operating-system software provides flexible computing environment accommodating both parallel and distributed processing. Also achieves balance among following competing factors; performance in processing and communications, ease of use, and tolerance of (and recovery from) faults.

  7. Computer Mediated Communication

    Science.gov (United States)

    Fano, Robert M.

    1984-08-01

    The use of computers in organizations is discussed in terms of its present and potential role in facilitating and mediating communication between people. This approach clarifies the impact that computers may have on the operation of organizations and on the individuals comprising them. Communication, which is essential to collaborative activities, must be properly controlled to protect individual and group privacy, which is equally essential. Our understanding of the human and organizational aspects of controlling communication and access to information presently lags behind our technical ability to implement the controls that may be needed.

  8. Convergence: Computing and communications

    Energy Technology Data Exchange (ETDEWEB)

    Catlett, C. [National Center for Supercomputing Applications, Champaign, IL (United States)

    1996-12-31

    This paper highlights the operations of the National Center for Supercomputing Applications (NCSA). NCSA is developing and implementing a national strategy to create, use, and transfer advanced computing and communication tools and information technologies for science, engineering, education, and business. The primary focus of the presentation is historical and expected growth in the computing capacity, personal computer performance, and Internet and WorldWide Web sites. Data are presented to show changes over the past 10 to 20 years in these areas. 5 figs., 4 tabs.

  9. A Language/Action Model of Human-Computer Communication in a Psychiatric Hospital

    Science.gov (United States)

    Morelli, R. A.; Goethe, J. W.; Bronzino, J. D.

    1990-01-01

    When a staff physician says to an intern he is supervising “I think you should try medication X,” this statement may differ in meaning from the same string of words spoken between colleagues. In the first case, the statement may have the force of an order (“Do this!”), while in the latter it is merely a suggestion. In either case, the utterance sets up important expectations which constrain the future actions of the parties involved. This paper lays out an analytic framework, based on speech act theory, for representing such “conversations for action” so that they may be used to inform the design of human-computer interaction. The language/action design perspective views the information system -- in this case an expert system that monitors drug treatment -- as one of many “agents” within a broad communicative network. Speech act theory is used to model a typical psychiatric hospital unit as a system of communicative action. In addition to identifying and characterizing the primary communicative agents and speech acts, the model presents a taxonomy of key conversational patterns and shows how they may be applied to the design of a clinical monitoring system. In the final section, the advantages and implications of this design approach are discussed.

  10. Communication issues in parallel computation

    Energy Technology Data Exchange (ETDEWEB)

    Tsantilas, A.M.

    1990-01-01

    This thesis examines the problem of interprocessor communication in realistic parallel computers. In particular, the author considers the problem of permutation routing and its generalizations in the mesh, hypercube and butterfly networks. Building on previous research, he derives lower bounds for a wide class of deterministic routing algorithms which imply that such algorithms create heavy traffic congestion. In contrast, he shows that randomized routing algorithms result in both efficient and optimal upper bounds in the above networks. Experiments were also performed to test the behavior of the randomized algorithms. These experiments suggest interesting theoretical problems. He also examines the problem of efficient interprocessor communication in a model suggested by recent advances in optical computing. The main argument of this thesis is that communication can be made efficient if randomization is used in the routing algorithms.

  11. Communication issues in parallel computation

    Energy Technology Data Exchange (ETDEWEB)

    Newman-Wolfe, R.E.

    1986-01-01

    This dissertation reviews models of parallel and distributed computation, with a focus on fundamental problems of communication between cooperating processes. Multi-stage switching networks are a relatively cheap and flexible medium of communication. New results are presented on embeddings and measure appropriate to multiprocessors connected by multi-stage switching networks, showing that such networks can efficiently simulate other topologies. An algebraic approach provides insight into the structure of the set of permutations that can be realized in two passes through the butterfly network in particular. In order to simulate another topology, or indeed, communicate at all, a communication network must somehow permit sharing of memory. New algorithms for controlling access to shared variables using weaker shared variables are presented. A trade off between the amount of space and the amount of waiting is exhibited in some of the algorithms. Another measure of the efficiency of communication is the size of the connecting network. The size of the communication medium required for a universal simulator is formulated here as a graph-theoretic problem.

  12. Computer-mediated communication: from a cognitive to a discursive model

    NARCIS (Netherlands)

    Lamerichs, J.M.W.J.; Molder, te H.F.M.

    2003-01-01

    In this article, we evaluate the ways in which computer-mediated communication (CMC) has thus far been conceptualized, proposing an alternative approach. It is argued that traditional perspectives ignore participants' everyday understanding of media use and media characteristics by relying on an ind

  13. An Analysis of Computer-Mediated Communication between Middle School Students and Scientist Role Models: A Pilot Study.

    Science.gov (United States)

    Murfin, Brian

    1994-01-01

    Reports on a study of the effectiveness of computer-mediated communication (CMC) in providing African American and female middle school students with scientist role models. Quantitative and qualitative data gathered by analyzing messages students and scientists posted on a shared electronic bulletin board showed that CMC could be an effective…

  14. Content Analysis in Computer-Mediated Communication: Analyzing Models for Assessing Critical Thinking through the Lens of Social Constructivism

    Science.gov (United States)

    Buraphadeja, Vasa; Dawson, Kara

    2008-01-01

    This article reviews content analysis studies aimed to assess critical thinking in computer-mediated communication. It also discusses theories and content analysis models that encourage critical thinking skills in asynchronous learning environments and reviews theories and factors that may foster critical thinking skills and new knowledge…

  15. Content Analysis in Computer-Mediated Communication: Analyzing Models for Assessing Critical Thinking through the Lens of Social Constructivism

    Science.gov (United States)

    Buraphadeja, Vasa; Dawson, Kara

    2008-01-01

    This article reviews content analysis studies aimed to assess critical thinking in computer-mediated communication. It also discusses theories and content analysis models that encourage critical thinking skills in asynchronous learning environments and reviews theories and factors that may foster critical thinking skills and new knowledge…

  16. Cooperation in human-computer communication

    OpenAIRE

    Kronenberg, Susanne

    2000-01-01

    The goal of this thesis is to simulate cooperation in human-computer communication to model the communicative interaction process of agents in natural dialogs in order to provide advanced human-computer interaction in that coherence is maintained between contributions of both agents, i.e. the human user and the computer. This thesis contributes to certain aspects of understanding and generation and their interaction in the German language. In spontaneous dialogs agents cooperate by the pro...

  17. Emerging air quality modeling technologies for high performance computing and communication environments

    Energy Technology Data Exchange (ETDEWEB)

    Byun, D.W.; Dabdub, D.; Fine, S.; Hanna, A.F.; Mathur, R.

    1996-03-01

    We describe a new design concept for the Eulerian AQMs incorporating recent developments in computer and atmospheric sciences. Second, we present several different experiences on parallel computation approaches for achieving fast turnaround time (speed) in AQMs. Finally, we show an application demonstration of a prototype multiscale air quality model collaboratively developed by scientists and system engineers under U.S. EPA`s Models-3 and MCNC`s Environmental Decision Support System (EDSS) projects.

  18. Computable models

    CERN Document Server

    Turner, Raymond

    2009-01-01

    Computational models can be found everywhere in present day science and engineering. In providing a logical framework and foundation for the specification and design of specification languages, Raymond Turner uses this framework to introduce and study computable models. In doing so he presents the first systematic attempt to provide computational models with a logical foundation. Computable models have wide-ranging applications from programming language semantics and specification languages, through to knowledge representation languages and formalism for natural language semantics. They are al

  19. System capacity and economic modeling computer tool for satellite mobile communications systems

    Science.gov (United States)

    Wiedeman, Robert A.; Wen, Doong; Mccracken, Albert G.

    1988-01-01

    A unique computer modeling tool that combines an engineering tool with a financial analysis program is described. The resulting combination yields a flexible economic model that can predict the cost effectiveness of various mobile systems. Cost modeling is necessary in order to ascertain if a given system with a finite satellite resource is capable of supporting itself financially and to determine what services can be supported. Personal computer techniques using Lotus 123 are used for the model in order to provide as universal an application as possible such that the model can be used and modified to fit many situations and conditions. The output of the engineering portion of the model consists of a channel capacity analysis and link calculations for several qualities of service using up to 16 types of earth terminal configurations. The outputs of the financial model are a revenue analysis, an income statement, and a cost model validation section.

  20. Communication and computing technology in biocontainment laboratories using the NEIDL as a model.

    Science.gov (United States)

    McCall, John; Hardcastle, Kath

    2014-07-01

    The National Emerging Infectious Diseases Laboratories (NEIDL), Boston University, is a globally unique biocontainment research facility housing biosafety level 2 (BSL-2), BSL-3, and BSL-4 laboratories. Located in the BioSquare area at the University's Medical Campus, it is part of a national network of secure facilities constructed to study infectious diseases of major public health concern. The NEIDL allows for basic, translational, and clinical phases of research to be carried out in a single facility with the overall goal of accelerating understanding, treatment, and prevention of infectious diseases. The NEIDL will also act as a center of excellence providing training and education in all aspects of biocontainment research. Within every detail of NEIDL operations is a primary emphasis on safety and security. The ultramodern NEIDL has required a new approach to communications technology solutions in order to ensure safety and security and meet the needs of investigators working in this complex building. This article discusses the implementation of secure wireless networks and private cloud computing to promote operational efficiency, biosecurity, and biosafety with additional energy-saving advantages. The utilization of a dedicated data center, virtualized servers, virtualized desktop integration, multichannel secure wireless networks, and a NEIDL-dedicated Voice over Internet Protocol (VoIP) network are all discussed.

  1. The Use of Communication Strategies in Computer-Mediated Communication.

    Science.gov (United States)

    Smith, Bryan

    2003-01-01

    Examines communication strategy use among adult learners of English in a computer-mediated environment. Specifically explored communication strategies employed during problem-free discourse as well as compensatory strategy use during task-based computer-mediated communication. Strategy use was also examined relative to communicative task type.…

  2. On Communication Models

    Institute of Scientific and Technical Information of China (English)

    蒋娜; 谢有琪

    2012-01-01

    With the development of human society, the social hub enlarges beyond one community to the extent that the world is deemed as a community as a whole. Communication, therefore, plays an increasingly important role in our daily life. As a consequence, communication model or the definition of which is not so much a definition as a guide in communication. However, some existed communication models are not as practical as it was. This paper tries to make an overall contrast among three communication models Coded Model, Gable Communication Model and Ostensive Inferential Model, to see how they assist people to comprehend verbal and non -verbal communication.

  3. An integrated communications demand model

    Science.gov (United States)

    Doubleday, C. F.

    1980-11-01

    A computer model of communications demand is being developed to permit dynamic simulations of the long-term evolution of demand for communications media in the U.K. to be made under alternative assumptions about social, economic and technological trends in British Telecom's business environment. The context and objectives of the project and the potential uses of the model are reviewed, and four key concepts in the demand for communications media, around which the model is being structured are discussed: (1) the generation of communications demand; (2) substitution between media; (3) technological convergence; and (4) competition. Two outline perspectives on the model itself are given.

  4. Communication with U.S. federal decision makers : a primer with notes on the use of computer models as a means of communication.

    Energy Technology Data Exchange (ETDEWEB)

    Webb, Erik Karl; Tidwell, Vincent Carroll

    2009-10-01

    This document outlines ways to more effectively communicate with U.S. Federal decision makers by outlining the structure, authority, and motivations of various Federal groups, how to find the trusted advisors, and how to structure communication. All three branches of Federal governments have decision makers engaged in resolving major policy issues. The Legislative Branch (Congress) negotiates the authority and the resources that can be used by the Executive Branch. The Executive Branch has some latitude in implementation and prioritizing resources. The Judicial Branch resolves disputes. The goal of all decision makers is to choose and implement the option that best fits the needs and wants of the community. However, understanding the risk of technical, political and/or financial infeasibility and possible unintended consequences is extremely difficult. Primarily, decision makers are supported in their deliberations by trusted advisors who engage in the analysis of options as well as the day-to-day tasks associated with multi-party negotiations. In the best case, the trusted advisors use many sources of information to inform the process including the opinion of experts and if possible predictive analysis from which they can evaluate the projected consequences of their decisions. The paper covers the following: (1) Understanding Executive and Legislative decision makers - What can these decision makers do? (2) Finding the target audience - Who are the internal and external trusted advisors? (3) Packaging the message - How do we parse and integrate information, and how do we use computer simulation or models in policy communication?

  5. Advances in Computer, Communication, Control and Automation

    CERN Document Server

    011 International Conference on Computer, Communication, Control and Automation

    2012-01-01

    The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011). 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011) has been held in Zhuhai, China, November 19-20, 2011. This volume  topics covered include signal and Image processing, speech and audio Processing, video processing and analysis, artificial intelligence, computing and intelligent systems, machine learning, sensor and neural networks, knowledge discovery and data mining, fuzzy mathematics and Applications, knowledge-based systems, hybrid systems modeling and design, risk analysis and management, system modeling and simulation. We hope that researchers, graduate students and other interested readers benefit scientifically from the proceedings and also find it stimulating in the process.

  6. Computational modeling of allosteric communication reveals organizing principles of mutation-induced signaling in ABL and EGFR kinases.

    Directory of Open Access Journals (Sweden)

    Anshuman Dixit

    2011-10-01

    Full Text Available The emerging structural information about allosteric kinase complexes and the growing number of allosteric inhibitors call for a systematic strategy to delineate and classify mechanisms of allosteric regulation and long-range communication that control kinase activity. In this work, we have investigated mechanistic aspects of long-range communications in ABL and EGFR kinases based on the results of multiscale simulations of regulatory complexes and computational modeling of signal propagation in proteins. These approaches have been systematically employed to elucidate organizing molecular principles of allosteric signaling in the ABL and EGFR multi-domain regulatory complexes and analyze allosteric signatures of the gate-keeper cancer mutations. We have presented evidence that mechanisms of allosteric activation may have universally evolved in the ABL and EGFR regulatory complexes as a product of a functional cross-talk between the organizing αF-helix and conformationally adaptive αI-helix and αC-helix. These structural elements form a dynamic network of efficiently communicated clusters that may control the long-range interdomain coupling and allosteric activation. The results of this study have unveiled a unifying effect of the gate-keeper cancer mutations as catalysts of kinase activation, leading to the enhanced long-range communication among allosterically coupled segments and stabilization of the active kinase form. The results of this study can reconcile recent experimental studies of allosteric inhibition and long-range cooperativity between binding sites in protein kinases. The presented study offers a novel molecular insight into mechanistic aspects of allosteric kinase signaling and provides a quantitative picture of activation mechanisms in protein kinases at the atomic level.

  7. Asynchronous Multi-Party Computation with Quadratic Communication

    DEFF Research Database (Denmark)

    Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz

    2008-01-01

    We present an efficient protocol for secure multi-party computation in the asynchronous model with optimal resilience. For n parties, up to t computed with communication complexity O(cn^2k) bits, which...

  8. Internode data communications in a parallel computer

    Science.gov (United States)

    Archer, Charles J; Blocksome, Michael A; Miller, Douglas R; Parker, Jeffrey J; Ratterman, Joseph D; Smith, Brian E

    2014-02-11

    Internode data communications in a parallel computer that includes compute nodes that each include main memory and a messaging unit, the messaging unit including computer memory and coupling compute nodes for data communications, in which, for each compute node at compute node boot time: a messaging unit allocates, in the messaging unit's computer memory, a predefined number of message buffers, each message buffer associated with a process to be initialized on the compute node; receives, prior to initialization of a particular process on the compute node, a data communications message intended for the particular process; and stores the data communications message in the message buffer associated with the particular process. Upon initialization of the particular process, the process establishes a messaging buffer in main memory of the compute node and copies the data communications message from the message buffer of the messaging unit into the message buffer of main memory.

  9. Internode data communications in a parallel computer

    Science.gov (United States)

    Archer, Charles J.; Blocksome, Michael A.; Miller, Douglas R.; Parker, Jeffrey J.; Ratterman, Joseph D.; Smith, Brian E.

    2013-09-03

    Internode data communications in a parallel computer that includes compute nodes that each include main memory and a messaging unit, the messaging unit including computer memory and coupling compute nodes for data communications, in which, for each compute node at compute node boot time: a messaging unit allocates, in the messaging unit's computer memory, a predefined number of message buffers, each message buffer associated with a process to be initialized on the compute node; receives, prior to initialization of a particular process on the compute node, a data communications message intended for the particular process; and stores the data communications message in the message buffer associated with the particular process. Upon initialization of the particular process, the process establishes a messaging buffer in main memory of the compute node and copies the data communications message from the message buffer of the messaging unit into the message buffer of main memory.

  10. Communication Analysis modelling techniques

    CERN Document Server

    España, Sergio; Pastor, Óscar; Ruiz, Marcela

    2012-01-01

    This report describes and illustrates several modelling techniques proposed by Communication Analysis; namely Communicative Event Diagram, Message Structures and Event Specification Templates. The Communicative Event Diagram is a business process modelling technique that adopts a communicational perspective by focusing on communicative interactions when describing the organizational work practice, instead of focusing on physical activities1; at this abstraction level, we refer to business activities as communicative events. Message Structures is a technique based on structured text that allows specifying the messages associated to communicative events. Event Specification Templates are a means to organise the requirements concerning a communicative event. This report can be useful to analysts and business process modellers in general, since, according to our industrial experience, it is possible to apply many Communication Analysis concepts, guidelines and criteria to other business process modelling notation...

  11. A Fundamental Tradeoff between Computation and Communication in Distributed Computing

    OpenAIRE

    Li, Songze; Maddah-Ali, Mohammad Ali; Yu, Qian; Avestimehr, A. Salman

    2016-01-01

    How can we optimally trade extra computing power to reduce the communication load in distributed computing? We answer this question by characterizing a fundamental tradeoff relationship between computation and communication in distributed computing, i.e., the two are inverse-linearly proportional to each other. More specifically, a general distributed computing framework, motivated by commonly used structures like MapReduce, is considered, where the goal is to compute $Q$ arbitrary output fun...

  12. Robust Multiparty Computation with Linear Communication Complexity

    DEFF Research Database (Denmark)

    Hirt, Martin; Nielsen, Jesper Buus

    2006-01-01

    We present a robust multiparty computation protocol. The protocol is for the cryptographic model with open channels and a poly-time adversary, and allows n parties to actively securely evaluate any poly-sized circuit with resilience t communication complexity in bits over the point......-to-point channels is (Sn+n), where S is the size of the circuit being securely evaluated, κ is the security parameter and is the communication complexity of one broadcast of a κ-bit value. This means the average number of bits sent and received by a single party is (S+), which is almost independent of the number...... of participating parties. This is the first robust multiparty computation protocol with this property....

  13. Trust models for efficient communication in Mobile Cloud Computing and their applications to e-Commerce

    Science.gov (United States)

    Pop, Florin; Dobre, Ciprian; Mocanu, Bogdan-Costel; Citoteanu, Oana-Maria; Xhafa, Fatos

    2016-11-01

    Managing the large dimensions of data processed in distributed systems that are formed by datacentres and mobile devices has become a challenging issue with an important impact on the end-user. Therefore, the management process of such systems can be achieved efficiently by using uniform overlay networks, interconnected through secure and efficient routing protocols. The aim of this article is to advance our previous work with a novel trust model based on a reputation metric that actively uses the social links between users and the model of interaction between them. We present and evaluate an adaptive model for the trust management in structured overlay networks, based on a Mobile Cloud architecture and considering a honeycomb overlay. Such a model can be useful for supporting advanced mobile market-share e-Commerce platforms, where users collaborate and exchange reliable information about, for example, products of interest and supporting ad-hoc business campaigns

  14. Modeling the Internet of Things, Self-Organizing and Other Complex Adaptive Communication Networks: A Cognitive Agent-Based Computing Approach.

    Science.gov (United States)

    Laghari, Samreen; Niazi, Muaz A

    2016-01-01

    Computer Networks have a tendency to grow at an unprecedented scale. Modern networks involve not only computers but also a wide variety of other interconnected devices ranging from mobile phones to other household items fitted with sensors. This vision of the "Internet of Things" (IoT) implies an inherent difficulty in modeling problems. It is practically impossible to implement and test all scenarios for large-scale and complex adaptive communication networks as part of Complex Adaptive Communication Networks and Environments (CACOONS). The goal of this study is to explore the use of Agent-based Modeling as part of the Cognitive Agent-based Computing (CABC) framework to model a Complex communication network problem. We use Exploratory Agent-based Modeling (EABM), as part of the CABC framework, to develop an autonomous multi-agent architecture for managing carbon footprint in a corporate network. To evaluate the application of complexity in practical scenarios, we have also introduced a company-defined computer usage policy. The conducted experiments demonstrated two important results: Primarily CABC-based modeling approach such as using Agent-based Modeling can be an effective approach to modeling complex problems in the domain of IoT. Secondly, the specific problem of managing the Carbon footprint can be solved using a multiagent system approach.

  15. Modeling the Internet of Things, Self-Organizing and Other Complex Adaptive Communication Networks: A Cognitive Agent-Based Computing Approach.

    Directory of Open Access Journals (Sweden)

    Samreen Laghari

    Full Text Available Computer Networks have a tendency to grow at an unprecedented scale. Modern networks involve not only computers but also a wide variety of other interconnected devices ranging from mobile phones to other household items fitted with sensors. This vision of the "Internet of Things" (IoT implies an inherent difficulty in modeling problems.It is practically impossible to implement and test all scenarios for large-scale and complex adaptive communication networks as part of Complex Adaptive Communication Networks and Environments (CACOONS. The goal of this study is to explore the use of Agent-based Modeling as part of the Cognitive Agent-based Computing (CABC framework to model a Complex communication network problem.We use Exploratory Agent-based Modeling (EABM, as part of the CABC framework, to develop an autonomous multi-agent architecture for managing carbon footprint in a corporate network. To evaluate the application of complexity in practical scenarios, we have also introduced a company-defined computer usage policy.The conducted experiments demonstrated two important results: Primarily CABC-based modeling approach such as using Agent-based Modeling can be an effective approach to modeling complex problems in the domain of IoT. Secondly, the specific problem of managing the Carbon footprint can be solved using a multiagent system approach.

  16. Integrating Computer-Mediated Communication Strategy Instruction

    Science.gov (United States)

    McNeil, Levi

    2016-01-01

    Communication strategies (CSs) play important roles in resolving problematic second language interaction and facilitating language learning. While studies in face-to-face contexts demonstrate the benefits of communication strategy instruction (CSI), there have been few attempts to integrate computer-mediated communication and CSI. The study…

  17. Intranode data communications in a parallel computer

    Science.gov (United States)

    Archer, Charles J; Blocksome, Michael A; Miller, Douglas R; Ratterman, Joseph D; Smith, Brian E

    2014-01-07

    Intranode data communications in a parallel computer that includes compute nodes configured to execute processes, where the data communications include: allocating, upon initialization of a first process of a computer node, a region of shared memory; establishing, by the first process, a predefined number of message buffers, each message buffer associated with a process to be initialized on the compute node; sending, to a second process on the same compute node, a data communications message without determining whether the second process has been initialized, including storing the data communications message in the message buffer of the second process; and upon initialization of the second process: retrieving, by the second process, a pointer to the second process's message buffer; and retrieving, by the second process from the second process's message buffer in dependence upon the pointer, the data communications message sent by the first process.

  18. Economic communication model set

    Science.gov (United States)

    Zvereva, Olga M.; Berg, Dmitry B.

    2017-06-01

    This paper details findings from the research work targeted at economic communications investigation with agent-based models usage. The agent-based model set was engineered to simulate economic communications. Money in the form of internal and external currencies was introduced into the models to support exchanges in communications. Every model, being based on the general concept, has its own peculiarities in algorithm and input data set since it was engineered to solve the specific problem. Several and different origin data sets were used in experiments: theoretic sets were estimated on the basis of static Leontief's equilibrium equation and the real set was constructed on the basis of statistical data. While simulation experiments, communication process was observed in dynamics, and system macroparameters were estimated. This research approved that combination of an agent-based and mathematical model can cause a synergetic effect.

  19. A High-Performance Communication Service for Parallel Servo Computing

    Directory of Open Access Journals (Sweden)

    Cheng Xin

    2010-11-01

    Full Text Available Complexity of algorithms for the servo control in the multi-dimensional, ultra-precise stage application has made multi-processor parallel computing technology needed. Considering the specific communication requirements in the parallel servo computing, we propose a communication service scheme based on VME bus, which provides high-performance data transmission and precise synchronization trigger support for the processors involved. Communications service is implemented on both standard VME bus and user-defined Internal Bus (IB, and can be redefined online. This paper introduces parallel servo computing architecture and communication service, describes structure and implementation details of each module in the service, and finally provides data transmission model and analysis. Experimental results show that communication services can provide high-speed data transmission with sub-nanosecond-level error of transmission latency, and synchronous trigger with nanosecond-level synchronization error. Moreover, the performance of communication service is not affected by the increasing number of processors.

  20. Educational Computer Utilization and Computer Communications.

    Science.gov (United States)

    Singh, Jai P.; Morgan, Robert P.

    As part of an analysis of educational needs and telecommunications requirements for future educational satellite systems, three studies were carried out. 1) The role of the computer in education was examined and both current status and future requirements were analyzed. Trade-offs between remote time sharing and remote batch process were explored…

  1. Distributed Function Computation in Asymmetric Communication Scenarios

    CERN Document Server

    Agnihotri, Samar

    2009-01-01

    We consider the distributed function computation problem in asymmetric communication scenarios, where the sink computes some deterministic function of the data split among N correlated informants. The distributed function computation problem is addressed as a generalization of distributed source coding (DSC) problem. We are mainly interested in minimizing the number of informant bits required, in the worst-case, to allow the sink to exactly compute the function. We provide a constructive solution for this in terms of an interactive communication protocol and prove its optimality. The proposed protocol also allows us to compute the worst-case achievable rate-region for the computation of any function. We define two classes of functions: lossy and lossless. We show that, in general, the lossy functions can be computed at the sink with fewer number of informant bits than the DSC problem, while computation of the lossless functions requires as many informant bits as the DSC problem.

  2. A lightweight communication library for distributed computing

    NARCIS (Netherlands)

    Groen, D.; Rieder, S.; Grosso, P.; de Laat, C.; Portegies Zwart, S.

    2010-01-01

    We present MPWide, a platform-independent communication library for performing message passing between computers. Our library allows coupling of several local message passing interface (MPI) applications through a long-distance network and is specifically optimized for such communications. The imple

  3. Computer-Mediated Communication on the Internet.

    Science.gov (United States)

    Herring, Susan C.

    2002-01-01

    This review of computer-mediated communication (CMC) on the Internet focuses on empirical research in noninstitutional and nonorganizational contexts. Highlights include modes of CMC; appropriate uses; social effects; effects on language and communication; freedom of expression; community; personal impacts; privacy; ethics; democracy;…

  4. Emerging trends in computing and communication

    CERN Document Server

    Das, Kunal; Khan, Gitosree

    2014-01-01

    The book presents papers delivered by researchers, industrial experts and academicians at the Conference on Emerging Trends in Computing and Communication (ETCC 2014). As such, the book is a collection of recent and innovative works in the field Network Security and Cryptography, Cloud Computing and Big Data Analytics, Data Mining and Data Warehouse, Communication and Nanotechnology and VLSI and Image Processing.

  5. Load sharing in models with communication delays

    NARCIS (Netherlands)

    Geest, R.A.B. van der

    1994-01-01

    Computer systems may be connected in a network to share workload. A control problem then is to decide which computer should carry out which task. Novel in this report is a model for load sharing with communication delays. It takes nonnegligible time for information from one computer to reach the oth

  6. Computational Interpersonal Communication: Communication Studies and Spoken Dialogue Systems

    Directory of Open Access Journals (Sweden)

    David J. Gunkel

    2016-09-01

    Full Text Available With the advent of spoken dialogue systems (SDS, communication can no longer be considered a human-to-human transaction. It now involves machines. These mechanisms are not just a medium through which human messages pass, but now occupy the position of the other in social interactions. But the development of robust and efficient conversational agents is not just an engineering challenge. It also depends on research in human conversational behavior. It is the thesis of this paper that communication studies is best situated to respond to this need. The paper argues: 1 that research in communication can supply the information necessary to respond to and resolve many of the open problems in SDS engineering, and 2 that the development of SDS applications can provide the discipline of communication with unique opportunities to test extant theory and verify experimental results. We call this new area of interdisciplinary collaboration “computational interpersonal communication” (CIC

  7. Computing, Information and Communications Technology (CICT) Website

    Science.gov (United States)

    Hardman, John; Tu, Eugene (Technical Monitor)

    2002-01-01

    The Computing, Information and Communications Technology Program (CICT) was established in 2001 to ensure NASA's Continuing leadership in emerging technologies. It is a coordinated, Agency-wide effort to develop and deploy key enabling technologies for a broad range of mission-critical tasks. The NASA CICT program is designed to address Agency-specific computing, information, and communications technology requirements beyond the projected capabilities of commercially available solutions. The areas of technical focus have been chosen for their impact on NASA's missions, their national importance, and the technical challenge they provide to the Program. In order to meet its objectives, the CICT Program is organized into the following four technology focused projects: 1) Computing, Networking and Information Systems (CNIS); 2) Intelligent Systems (IS); 3) Space Communications (SC); 4) Information Technology Strategic Research (ITSR).

  8. (CICT) Computing, Information, and Communications Technology Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The goal of the Computing, Information, and Communications Technology (CICT) program is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communications technologies. This viewgraph presentation includes diagrams of how the political guidance behind CICT is structured. The presentation profiles each part of the NASA Mission in detail, and relates the Mission to the activities of CICT. CICT's Integrated Capability Goal is illustrated, and hypothetical missions which could be enabled by CICT are profiled. CICT technology development is profiled.

  9. International Conference on Computer, Communication and Computational Sciences

    CERN Document Server

    Mishra, Krishn; Tiwari, Shailesh; Singh, Vivek

    2017-01-01

    Exchange of information and innovative ideas are necessary to accelerate the development of technology. With advent of technology, intelligent and soft computing techniques came into existence with a wide scope of implementation in engineering sciences. Keeping this ideology in preference, this book includes the insights that reflect the ‘Advances in Computer and Computational Sciences’ from upcoming researchers and leading academicians across the globe. It contains high-quality peer-reviewed papers of ‘International Conference on Computer, Communication and Computational Sciences (ICCCCS 2016), held during 12-13 August, 2016 in Ajmer, India. These papers are arranged in the form of chapters. The content of the book is divided into two volumes that cover variety of topics such as intelligent hardware and software design, advanced communications, power and energy optimization, intelligent techniques used in internet of things, intelligent image processing, advanced software engineering, evolutionary and ...

  10. Computer Simulation in Information and Communication Engineering

    CERN Multimedia

    Anton Topurov

    2005-01-01

    CSICE'05 Sofia, Bulgaria 20th - 22nd October, 2005 On behalf of the International Scientific Committee, we would like to invite you all to Sofia, the capital city of Bulgaria, to the International Conference in Computer Simulation in Information and Communication Engineering CSICE'05. The Conference is aimed at facilitating the exchange of experience in the field of computer simulation gained not only in traditional fields (Communications, Electronics, Physics...) but also in the areas of biomedical engineering, environment, industrial design, etc. The objective of the Conference is to bring together lectures, researchers and practitioners from different countries, working in the fields of computer simulation in information engineering, in order to exchange information and bring new contribution to this important field of engineering design and education. The Conference will bring you the latest ideas and development of the tools for computer simulation directly from their inventors. Contribution describ...

  11. Computational Psychometrics in Communication and Implications in Decision Making

    Science.gov (United States)

    Cipresso, Pietro; Villani, Daniela; Repetto, Claudia; Bosone, Lucia; Balgera, Anna; Mauri, Maurizio; Villamira, Marco; Antonietti, Alessandro; Riva, Giuseppe

    2015-01-01

    Recent investigations emphasized the role of communication features on behavioral trust and reciprocity in economic decision making but no studies have been focused on the effect of communication on affective states in such a context. Thanks to advanced methods of computational psychometrics, in this study, affective states were deeply examined using simultaneous and synchronized recordings of gazes and psychophysiological signals in 28 female students during an investment game. Results showed that participants experienced different affective states according to the type of communication (personal versus impersonal). In particular, participants involved in personal communication felt more relaxed than participants involved in impersonal communication. Moreover, personal communication influenced reciprocity and participants' perceptions about trust and reciprocity. Findings were interpreted in the light of the Arousal/Valence Model and self-disclosure process. PMID:26339285

  12. Computational Psychometrics in Communication and Implications in Decision Making

    Directory of Open Access Journals (Sweden)

    Pietro Cipresso

    2015-01-01

    Full Text Available Recent investigations emphasized the role of communication features on behavioral trust and reciprocity in economic decision making but no studies have been focused on the effect of communication on affective states in such a context. Thanks to advanced methods of computational psychometrics, in this study, affective states were deeply examined using simultaneous and synchronized recordings of gazes and psychophysiological signals in 28 female students during an investment game. Results showed that participants experienced different affective states according to the type of communication (personal versus impersonal. In particular, participants involved in personal communication felt more relaxed than participants involved in impersonal communication. Moreover, personal communication influenced reciprocity and participants’ perceptions about trust and reciprocity. Findings were interpreted in the light of the Arousal/Valence Model and self-disclosure process.

  13. Computer Mediated Communication (CMC e Second Life

    Directory of Open Access Journals (Sweden)

    Annalisa Boniello

    2013-03-01

    Full Text Available In questo contributo sono riportate alcune esperienze e sperimentazioni didattiche che descrivono occasioni di comunicazione formativa (Computer Mediated Communication – CMC attraverso ambienti 3D quali Second Life (SL. Sono inoltre evidenziati e descritti i principali strumenti di comunicazione in SL e il loro utilizzo.

  14. Computer-Mediated Communication and Interpersonal Perceptions.

    Science.gov (United States)

    Adkins, Mark E.

    A study investigated the conditions under which computer-mediated communication (CMC) (electronic mail) senders were perceived as self-absorbed by CMC receivers. Experience with electronic mail was the independent variable and perceived self-absorption, attraction, and homophily were the dependent variables. Two-hundred fifty volunteers from a…

  15. Computer-Mediated Communication: An Experimental Study.

    Science.gov (United States)

    Smith, William E.

    1994-01-01

    Investigates the effectiveness of a computer-mediated communication system in supplementing traditional instruction in a media law course. Finds mixed results on measures of satisfaction and no significant improvement on exam scores. Notes that the system required more time from the instructor and students. (SR)

  16. Directional coupling for quantum computing and communication.

    Science.gov (United States)

    Nikolopoulos, Georgios M

    2008-11-14

    We introduce the concept of directional coupling, i.e., the selective transfer of a state between adjacent quantum wires, in the context of quantum computing and communication. Our analysis rests upon a mathematical analogy between a dual-channel directional coupler and a composite spin system.

  17. Synchronous Computer-Mediated Communication and Interaction

    Science.gov (United States)

    Ziegler, Nicole

    2016-01-01

    The current study reports on a meta-analysis of the relative effectiveness of interaction in synchronous computer-mediated communication (SCMC) and face-to-face (FTF) contexts. The primary studies included in the analysis were journal articles and dissertations completed between 1990 and 2012 (k = 14). Results demonstrate that interaction in SCMC…

  18. Conversation Analysis of Computer-Mediated Communication

    Science.gov (United States)

    Gonzalez-Lloret, Marta

    2011-01-01

    The potential of computer-mediated communication (CMC) for language learning resides mainly in the possibility that learners have to engage with other speakers of the language, including L1 speakers. The inclusion of CMC in the L2 classroom provides an opportunity for students to utilize authentic language in real interaction, rather than the more…

  19. Future Computer, Communication, Control and Automation

    CERN Document Server

    2011 International Conference on Computer, Communication, Control and Automation

    2012-01-01

    The volume includes a set of selected papers extended and revised from the 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011). 2011 International Conference on Computer, Communication, Control and Automation (3CA 2011) has been held in Zhuhai, China, November 19-20, 2011. This volume topics covered include wireless communications, advances in wireless video, wireless sensors networking, security in wireless networks, network measurement and management, hybrid and discrete-event systems, internet analytics and automation, robotic system and applications, reconfigurable automation systems, machine vision in automation. We hope that researchers, graduate students and other interested readers benefit scientifically from the proceedings and also find it stimulating in the process.

  20. Noise-based communication and computing

    CERN Document Server

    Kish, Laszlo B

    2008-01-01

    We discuss the speed-error-heat triangle and related problems with rapidly increasing energy dissipation and error rate during miniaturization. These and the independently growing need of unconditional data security have provoked non-conventional approaches in the physics of informatics. Noise-based informatics is a potentially promising possibility which is the way how biological brains process the information. Recently, it has been shown that thermal noise and its electronically enhanced versions (Johnson-like noises) can be utilized as information carrier with peculiar properties. Relevant examples are Zero power (stealth) communication, Unconditionally secure communication with Johnson(-like) noise and Kirchhoff loop and Noise-driven computing. The zero power communication utilizes the equilibrium background noise in the channel to transfer information. The unconditionally secure communication is based on the properties of Johnson(-like) noise and those of a simple Kirchhoff's loop. The scheme utilizes on...

  1. High performance computing and communications panel report

    Energy Technology Data Exchange (ETDEWEB)

    1992-12-01

    In FY92, a presidential initiative entitled High Performance Computing and Communications (HPCC) was launched, aimed at securing U.S. preeminence in high performance computing and related communication technologies. The stated goal of the initiative is threefold: extend U.S. technological leadership in high performance computing and computer communications; provide wide dissemination and application of the technologies; and spur gains in U.S. productivity and industrial competitiveness, all within the context of the mission needs of federal agencies. Because of the importance of the HPCC program to the national well-being, especially its potential implication for industrial competitiveness, the Assistant to the President for Science and Technology has asked that the President's Council of Advisors in Science and Technology (PCAST) establish a panel to advise PCAST on the strengths and weaknesses of the HPCC program. The report presents a program analysis based on strategy, balance, management, and vision. Both constructive recommendations for program improvement and positive reinforcement of successful program elements are contained within the report.

  2. Computer-Aided Communication Satellite System Analysis and Optimization.

    Science.gov (United States)

    Stagl, Thomas W.; And Others

    Various published computer programs for fixed/broadcast communication satellite system synthesis and optimization are discussed. The rationale for selecting General Dynamics/Convair's Satellite Telecommunication Analysis and Modeling Program (STAMP) in modified form to aid in the system costing and sensitivity analysis work in the Program on…

  3. The Models of Revelational Communication

    Directory of Open Access Journals (Sweden)

    Lotfi, S.M

    2012-01-01

    Full Text Available Quranic revelation is a verbal communication between the Prophet and God which is in the communication model includes sender, recipient, purpose and channels of communication. Muslim scholars and some of the orientalists, offering a variety of communication models that can be investigated in the form of linear and nonlinear models. Linear models contains different elements of revelated communication and attempt to draw process of sending revelation. Some part of this models have a structural fault. nonlinear models also drawing the process of prophet soul ascending and take a different process for sending of revelation but ascending soul of prophet oppose with quran, traditions and communication principles. This type of models is also deficient and weak. This paper review the different models of communication and criticize them from quranic and hadiths point of view.

  4. Optimized data communications in a parallel computer

    Science.gov (United States)

    Faraj, Daniel A.

    2014-08-19

    A parallel computer includes nodes that include a network adapter that couples the node in a point-to-point network and supports communications in opposite directions of each dimension. Optimized communications include: receiving, by a network adapter of a receiving compute node, a packet--from a source direction--that specifies a destination node and deposit hints. Each hint is associated with a direction within which the packet is to be deposited. If a hint indicates the packet to be deposited in the opposite direction: the adapter delivers the packet to an application on the receiving node; forwards the packet to a next node in the opposite direction if the receiving node is not the destination; and forwards the packet to a node in a direction of a subsequent dimension if the hints indicate that the packet is to be deposited in the direction of the subsequent dimension.

  5. SUSTAINABLE INNOVATION IN COMPUTER COMMUNICATION AND MANAGEMENT

    OpenAIRE

    George Carutasu

    2013-01-01

    In this paper will be emphasized common management processes and structures that sustain innovation in Computer Communication and Management. In the beginning, innovation concept and theory will be debated, together with governmental and European structures which support innovation. In the second part of article, some of specific university innovation structures are exposed and compared. Third section of paper presents some innovative products developed in university field. Last part will und...

  6. Why E-Business Must Evolve beyond Market Orientation: Applying Human Interaction Models to Computer-Mediated Corporate Communications.

    Science.gov (United States)

    Johnston, Kevin McCullough

    2001-01-01

    Considers the design of corporate communications for electronic business and discusses the increasing importance of corporate interaction as companies work in virtual environments. Compares sociological and psychological theories of human interaction and relationship formation with organizational interaction theories of corporate relationship…

  7. Computational neurogenetic modeling

    CERN Document Server

    Benuskova, Lubica

    2010-01-01

    Computational Neurogenetic Modeling is a student text, introducing the scope and problems of a new scientific discipline - Computational Neurogenetic Modeling (CNGM). CNGM is concerned with the study and development of dynamic neuronal models for modeling brain functions with respect to genes and dynamic interactions between genes. These include neural network models and their integration with gene network models. This new area brings together knowledge from various scientific disciplines, such as computer and information science, neuroscience and cognitive science, genetics and molecular biol

  8. The anglicisms in computer-mediated communication

    Directory of Open Access Journals (Sweden)

    Jan Lazar

    2012-01-01

    Full Text Available Although French is a Romance language descendant from the Latin, there is of course some influence of other languages on it. English is perhaps the most important source of loan-words for the present French language. Our article is focused on new forms of written communication, mainly computer-mediated communication (CMC. The main aim of this article is to analyze the loan-words, especially the anglicisms that are used by chatters in various French chats. After examining the motivations of loan, the article studies the frequency of anglicisms in three chats and observes their grammatical adaptation in the context of CMC. A huge richness of anglicisms is illustrated by concrete examples taken from our corpus.

  9. Fingerprinting Communication and Computation on HPC Machines

    Energy Technology Data Exchange (ETDEWEB)

    Peisert, Sean

    2010-06-02

    How do we identify what is actually running on high-performance computing systems? Names of binaries, dynamic libraries loaded, or other elements in a submission to a batch queue can give clues, but binary names can be changed, and libraries provide limited insight and resolution on the code being run. In this paper, we present a method for"fingerprinting" code running on HPC machines using elements of communication and computation. We then discuss how that fingerprint can be used to determine if the code is consistent with certain other types of codes, what a user usually runs, or what the user requested an allocation to do. In some cases, our techniques enable us to fingerprint HPC codes using runtime MPI data with a high degree of accuracy.

  10. The nonverbal communication functions of emoticons in computer-mediated communication.

    Science.gov (United States)

    Lo, Shao-Kang

    2008-10-01

    Most past studies assume that computer-mediated communication (CMC) lacks nonverbal communication cues. However, Internet users have devised and learned to use emoticons to assist their communications. This study examined emoticons as a communication tool that, although presented as verbal cues, perform nonverbal communication functions. We therefore termed emoticons quasi-nonverbal cues.

  11. Redesigning Computer-based Learning Environments: Evaluation as Communication

    CERN Document Server

    Brust, Matthias R; Ricarte, Ivan M L

    2007-01-01

    In the field of evaluation research, computer scientists live constantly upon dilemmas and conflicting theories. As evaluation is differently perceived and modeled among educational areas, it is not difficult to become trapped in dilemmas, which reflects an epistemological weakness. Additionally, designing and developing a computer-based learning scenario is not an easy task. Advancing further, with end-users probing the system in realistic settings, is even harder. Computer science research in evaluation faces an immense challenge, having to cope with contributions from several conflicting and controversial research fields. We believe that deep changes must be made in our field if we are to advance beyond the CBT (computer-based training) learning model and to build an adequate epistemology for this challenge. The first task is to relocate our field by building upon recent results from philosophy, psychology, social sciences, and engineering. In this article we locate evaluation in respect to communication s...

  12. 2nd International Conference on Intelligent Computing, Communication & Devices

    CERN Document Server

    Popentiu-Vladicescu, Florin

    2017-01-01

    The book presents high quality papers presented at 2nd International Conference on Intelligent Computing, Communication & Devices (ICCD 2016) organized by Interscience Institute of Management and Technology (IIMT), Bhubaneswar, Odisha, India, during 13 and 14 August, 2016. The book covers all dimensions of intelligent sciences in its three tracks, namely, intelligent computing, intelligent communication and intelligent devices. intelligent computing track covers areas such as intelligent and distributed computing, intelligent grid and cloud computing, internet of things, soft computing and engineering applications, data mining and knowledge discovery, semantic and web technology, hybrid systems, agent computing, bioinformatics, and recommendation systems. Intelligent communication covers communication and network technologies, including mobile broadband and all optical networks that are the key to groundbreaking inventions of intelligent communication technologies. This covers communication hardware, soft...

  13. Wide-Area Computer-Mediated Communication in Business Writing.

    Science.gov (United States)

    Howard, Tharon

    1992-01-01

    Discusses the differences between computer-mediated communication (CMC) and print or oral communication. Describes advantages and problems of using electronic mail in a business context. Recommends research and teaching of CMC in the business writing classroom. (MM)

  14. Intergroup differentiation in computer-mediated communication : Effects of depersonalization

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Lea, M

    2002-01-01

    Two studies examined intergroup discussions via computer-mediated communication systems. It was hypothesized that depersonalization, in comparison with individuated interaction, would increase the tendency for intergroup differentiation in attitudes and stereotypes, In Study 1, 24 groups communicate

  15. Professional networking using computer-mediated communication.

    Science.gov (United States)

    Washer, Peter

    Traditionally, professionals have networked with others in their field through attending conferences, professional organizations, direct mailing, and via the workplace. Recently, there have been new possibilities to network with other professionals using the internet. This article looks at the possibilities that the internet offers for professional networking, particularly e-mailing lists, newsgroups and membership databases, and compares them against more traditional methods of professional networking. The different types of computer-mediated communication are discussed and their relative merits and disadvantages are examined. The benefits and potential pitfalls of internet professional networking, as it relates to the nursing profession, are examined. Practical advice is offered on how the internet can be used as a means to foster professional networks of academic, clinical or research interests.

  16. Modeling Trusted Computing

    Institute of Scientific and Technical Information of China (English)

    CHEN Shuyi; WEN Yingyou; ZHAO Hong

    2006-01-01

    In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems.

  17. Cross-Cultural Communication Patterns in Computer Mediated Communication

    Science.gov (United States)

    Panina, Daria; Kroumova, Maya

    2015-01-01

    There are important cultural differences in attitudes towards and use of electronic text communication. Consistent with Hall's high-context/low-context conceptualization of culture, electronic inter-cultural communication, just as verbal inter-cultural communication, is affected by the culturally-specific assumptions and preferences of message…

  18. COMPUTER SYSTEM AND MODELLING OF THREATS TO ENERGY SECURITY OF MOLDOVA IN CASE OF INTERSYSTEM COMMUNICATION DISCONNECTION

    Directory of Open Access Journals (Sweden)

    Bicova E.V.

    2010-12-01

    Full Text Available In the paper modeling of a group of scenarios of threats to energetic security of Moldovan energy system, which occur in case of disconnecting (or limitation of cross-flows of electricity of 330 kV transmission line Balti-Dniester HPS. It was used for analysis a software application for energy security monitoring. The application has been developed in IE ASM.

  19. PREFACE: Quantum Information, Communication, Computation and Cryptography

    Science.gov (United States)

    Benatti, F.; Fannes, M.; Floreanini, R.; Petritis, D.

    2007-07-01

    The application of quantum mechanics to information related fields such as communication, computation and cryptography is a fast growing line of research that has been witnessing an outburst of theoretical and experimental results, with possible practical applications. On the one hand, quantum cryptography with its impact on secrecy of transmission is having its first important actual implementations; on the other hand, the recent advances in quantum optics, ion trapping, BEC manipulation, spin and quantum dot technologies allow us to put to direct test a great deal of theoretical ideas and results. These achievements have stimulated a reborn interest in various aspects of quantum mechanics, creating a unique interplay between physics, both theoretical and experimental, mathematics, information theory and computer science. In view of all these developments, it appeared timely to organize a meeting where graduate students and young researchers could be exposed to the fundamentals of the theory, while senior experts could exchange their latest results. The activity was structured as a school followed by a workshop, and took place at The Abdus Salam International Center for Theoretical Physics (ICTP) and The International School for Advanced Studies (SISSA) in Trieste, Italy, from 12-23 June 2006. The meeting was part of the activity of the Joint European Master Curriculum Development Programme in Quantum Information, Communication, Cryptography and Computation, involving the Universities of Cergy-Pontoise (France), Chania (Greece), Leuven (Belgium), Rennes1 (France) and Trieste (Italy). This special issue of Journal of Physics A: Mathematical and Theoretical collects 22 contributions from well known experts who took part in the workshop. They summarize the present day status of the research in the manifold aspects of quantum information. The issue is opened by two review articles, the first by G Adesso and F Illuminati discussing entanglement in continuous variable

  20. Analysis of Network Performance for Computer Communication Systems with Benchmark

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    This paper introduced a performance evaluating approach of computer communication system based on the simulation and measurement technology, and discussed its evaluating models. The result of our experiment showed that the outcome of practical measurement on Ether-LAN fitted in well with the theoreticai analysis. The approach we presented can be used to define various kinds of artificially simulated load models conveniently, build all kinds of network application environments in a flexible way, and exert sufficientiy the widely-used and high-precision features of the traditional simulation technology and the reality,reliability, adaptability features of measurement technology.

  1. 1st International Conference on Communication and Computer Engineering

    CERN Document Server

    Othman, Mohd; Othman, Mohd; Rahim, Yahaya; Pee, Naim

    2015-01-01

    This book covers diverse aspects of advanced computer and communication engineering, focusing specifically on industrial and manufacturing theory and applications of electronics, communications, computing, and information technology. Experts in research, industry, and academia present the latest developments in technology, describe applications involving cutting-edge communication and computer systems, and explore likely future directions. In addition, access is offered to numerous new algorithms that assist in solving computer and communication engineering problems. The book is based on presentations delivered at ICOCOE 2014, the 1st International Conference on Communication and Computer Engineering. It will appeal to a wide range of professionals in the field, including telecommunication engineers, computer engineers and scientists, researchers, academics, and students.

  2. 2nd International Conference on Communication and Computer Engineering

    CERN Document Server

    Othman, Mohd; Othman, Mohd; Rahim, Yahaya; Pee, Naim

    2016-01-01

    This book covers diverse aspects of advanced computer and communication engineering, focusing specifically on industrial and manufacturing theory and applications of electronics, communications, computing and information technology. Experts in research, industry, and academia present the latest developments in technology, describe applications involving cutting-edge communication and computer systems, and explore likely future trends. In addition, a wealth of new algorithms that assist in solving computer and communication engineering problems are presented. The book is based on presentations given at ICOCOE 2015, the 2nd International Conference on Communication and Computer Engineering. It will appeal to a wide range of professionals in the field, including telecommunication engineers, computer engineers and scientists, researchers, academics and students.

  3. 3rd International Conference on Computer & Communication Technologies

    CERN Document Server

    Bhateja, Vikrant; Raju, K; Janakiramaiah, B

    2017-01-01

    The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.

  4. Artificial intelligence and tutoring systems computational and cognitive approaches to the communication of knowledge

    CERN Document Server

    Wenger, Etienne

    2014-01-01

    Artificial Intelligence and Tutoring Systems: Computational and Cognitive Approaches to the Communication of Knowledge focuses on the cognitive approaches, methodologies, principles, and concepts involved in the communication of knowledge. The publication first elaborates on knowledge communication systems, basic issues, and tutorial dialogues. Concerns cover natural reasoning and tutorial dialogues, shift from local strategies to multiple mental models, domain knowledge, pedagogical knowledge, implicit versus explicit encoding of knowledge, knowledge communication, and practical and theoretic

  5. The formation of group norms in computer-mediated communication

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Lea, M

    2000-01-01

    The formation of group norms in computer-mediated communication (CMC) was examined among students who used e-mail as part of a course. A network analysis of group structures revealed that (a) content and form of communication is normative, group norms defining communication patterns within groups, (

  6. The formation of group norms in computer-mediated communication

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Lea, M

    2000-01-01

    The formation of group norms in computer-mediated communication (CMC) was examined among students who used e-mail as part of a course. A network analysis of group structures revealed that (a) content and form of communication is normative, group norms defining communication patterns within groups, (

  7. Communicative Competence vs. Communicative Cognizance: Jakobson's Model Revisited.

    Science.gov (United States)

    Brown, James W.

    1984-01-01

    Jakobson's communication model, grounded in semiotic theory, provides an excellent point of departure for developing specific pedagogical approaches to the constituent elements of all communicative acts, verbal or nonverbal. True communication occurs only when students and teachers are cognizant of the features and functions of communication as…

  8. Communication and Computability: The Case of Alan Mathison Turing.

    Science.gov (United States)

    Chesebro, James W.

    1993-01-01

    Provides a preliminary examination of the relationships which exist between the disciplines of communication and computer science. Isolates the original principles which determined the development of computer science. Suggests how these early formation principles had and continue to have on the study of communication. Focuses on the seminal role…

  9. Computing, Information, and Communications Technology (CICT) Program Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The Computing, Information and Communications Technology (CICT) Program's goal is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communication technologies

  10. Frontier and innovation in future computing and communications

    CERN Document Server

    Zomaya, Albert; Jeong, Hwa-Young; Obaidat, Mohammad

    2014-01-01

    IT technology engineering changes everyday life, especially in Computing and Communications. The goal of this book is to further explore the theoretical and practical issues of Future Computing and Communications. It also aims to foster new ideas and collaboration between researchers and practitioners.

  11. Principles of mobile computing and communications

    CERN Document Server

    Othman, Mazliza

    2007-01-01

    Introduction Mobile Computing Applications Evolution of Wireless Networks and Services Summary Cellular Network Architecture UMTS Architecture Public Land Mobile Network Interfaces User Authentication Frequency Reuse Channel Assignment Location Registration and Update Handover Procedures CDMA The Move toward 3G Networks Wireless Local Area Networks IEEE 802.11 Standard IEEE 802.11b Standard (Wi-Fi) IEEE 802.11a Standard IEEE 802.11g Standard HIPERLAN/2 IEEE 802.1x Standard IEEE 802.11i Standard IEEE 802.11e Standard Security Issues IP over 802.11 WLAN Integrating 802.11 WLAN and UMTS Summary Wireless Personal Area Networks HomeRF Bluetooth Technology IEEE 802.15.3 Standard Home Area Networks Summary Wireless Sensor Networks Applications of WSNs Requirements for WSNs WSN Architecture The 802.15.4 Standard The ZigBee Protocol Power Conservation Techniques Network and Communications Configuration of Sensor Networks WSN and Emergency Response Applications Summary Mobile Ad Hoc Networks AODV DSR OLSR TBRPF Summary...

  12. Communication models in environmental health.

    Science.gov (United States)

    Guidotti, Tee L

    2013-01-01

    Communication models common in environmental health are not well represented in the literature on health communication. Risk communication is a systematic approach to conveying essential information about a specific environmental issue and a framework for thinking about community risk and the alternatives for dealing with it. Crisis communication is intended to provide essential information to people facing an emergency in order to mitigate its effects and to enable them to make appropriate decisions, and it is primarily used in emergency management. Corporate communication is intended to achieve a change in attitude or perception of an organization, and its role in environmental health is usually public relations or to rehabilitate a damaged reputation. Environmental health education is a more didactic approach to science education with respect to health and the environment. Social marketing uses conventional marketing methods to achieve a socially desirable purpose but is more heavily used in health promotion generally. Communication models and styles in environmental health are specialized to serve the needs of the field in communicating with the community. They are highly structured and executed in different ways but have in common a relative lack of emphasis on changing personal or lifestyle behavior compared with health promotion and public health in general and a tendency to emphasize content on specific environmental issues and decision frameworks for protecting oneself or the community through collective action.

  13. Future Communication, Computing, Control and Management Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  14. Future Communication, Computing, Control and Management Volume 2

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  15. Future Computing, Communication, Control and Management Volume 2

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in the ICF4C 2011 conference. 2011 International Conference on Future Communication, Computing, Control and Management (ICF4C 2011) has been held on December 16-17, 2011, Phuket, Thailand. Topics covered include intelligent computing, network management, wireless networks, telecommunication, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Computing, Communication, Control, and Management and also serve as an excellent reference work for researchers and graduate students working on Computing, Communication, Control, and Management Research.

  16. Computer Modeling and Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Pronskikh, V. S. [Fermilab

    2014-05-09

    Verification and validation of computer codes and models used in simulation are two aspects of the scientific practice of high importance and have recently been discussed by philosophers of science. While verification is predominantly associated with the correctness of the way a model is represented by a computer code or algorithm, validation more often refers to model’s relation to the real world and its intended use. It has been argued that because complex simulations are generally not transparent to a practitioner, the Duhem problem can arise for verification and validation due to their entanglement; such an entanglement makes it impossible to distinguish whether a coding error or model’s general inadequacy to its target should be blamed in the case of the model failure. I argue that in order to disentangle verification and validation, a clear distinction between computer modeling (construction of mathematical computer models of elementary processes) and simulation (construction of models of composite objects and processes by means of numerical experimenting with them) needs to be made. Holding on to that distinction, I propose to relate verification (based on theoretical strategies such as inferences) to modeling and validation, which shares the common epistemology with experimentation, to simulation. To explain reasons of their intermittent entanglement I propose a weberian ideal-typical model of modeling and simulation as roles in practice. I suggest an approach to alleviate the Duhem problem for verification and validation generally applicable in practice and based on differences in epistemic strategies and scopes

  17. Computational Intelligence, Cyber Security and Computational Models

    CERN Document Server

    Anitha, R; Lekshmi, R; Kumar, M; Bonato, Anthony; Graña, Manuel

    2014-01-01

    This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications for design, analysis, and modeling of computational intelligence and security. The book will be useful material for students, researchers, professionals, and academicians. It will help in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.

  18. Computational human body models

    NARCIS (Netherlands)

    Wismans, J.S.H.M.; Happee, R.; Dommelen, J.A.W. van

    2005-01-01

    Computational human body models are widely used for automotive crashsafety research and design and as such have significantly contributed to a reduction of traffic injuries and fatalities. Currently crash simulations are mainly performed using models based on crash-dummies. However crash dummies dif

  19. Computational human body models

    NARCIS (Netherlands)

    Wismans, J.S.H.M.; Happee, R.; Dommelen, J.A.W. van

    2005-01-01

    Computational human body models are widely used for automotive crashsafety research and design and as such have significantly contributed to a reduction of traffic injuries and fatalities. Currently crash simulations are mainly performed using models based on crash-dummies. However crash dummies

  20. Formal Modeling of Communication Protocols.

    Science.gov (United States)

    1981-03-01

    problems have been developed. 4 FORMAL MODELING OF COMMUNICATION PROTOCOLS The state machine model is motivated by the observation that protocols may be...simplest types of state machine model because they have only a single state variable (the state) which takes on a relatively small range of values. For...grammar, this correspondence is very apparent. For each state of the state machine model , we define a nonterminal symbol in the grammar. The inputs

  1. Scheduling with communication for multiprocessor computation

    NARCIS (Netherlands)

    Verriet, J.H.

    1998-01-01

    Multiprocessor scheduling houdt zich bezig met de planning van de uitvoering van computer-programma s op een parallelle computer. Een computerprogramma kan worden gezien als een collectie instructies die gegroepeerd zijn in taken. Een parallelle computer is een computer met meerdere processoren

  2. Computationally Modeling Interpersonal Trust

    Directory of Open Access Journals (Sweden)

    Jin Joo eLee

    2013-12-01

    Full Text Available We present a computational model capable of predicting—above human accuracy—the degree of trust a person has toward their novel partner by observing the trust-related nonverbal cues expressed in their social interaction. We summarize our prior work, in which we identify nonverbal cues that signal untrustworthy behavior and also demonstrate the human mind’s readiness to interpret those cues to assess the trustworthiness of a social robot. We demonstrate that domain knowledge gained from our prior work using human-subjects experiments, when incorporated into the feature engineering process, permits a computational model to outperform both human predictions and a baseline model built in naivete' of this domain knowledge. We then present the construction of hidden Markov models to incorporate temporal relationships among the trust-related nonverbal cues. By interpreting the resulting learned structure, we observe that models built to emulate different levels of trust exhibit different sequences of nonverbal cues. From this observation, we derived sequence-based temporal features that further improve the accuracy of our computational model. Our multi-step research process presented in this paper combines the strength of experimental manipulation and machine learning to not only design a computational trust model but also to further our understanding of the dynamics of interpersonal trust.

  3. Computationally modeling interpersonal trust.

    Science.gov (United States)

    Lee, Jin Joo; Knox, W Bradley; Wormwood, Jolie B; Breazeal, Cynthia; Desteno, David

    2013-01-01

    We present a computational model capable of predicting-above human accuracy-the degree of trust a person has toward their novel partner by observing the trust-related nonverbal cues expressed in their social interaction. We summarize our prior work, in which we identify nonverbal cues that signal untrustworthy behavior and also demonstrate the human mind's readiness to interpret those cues to assess the trustworthiness of a social robot. We demonstrate that domain knowledge gained from our prior work using human-subjects experiments, when incorporated into the feature engineering process, permits a computational model to outperform both human predictions and a baseline model built in naiveté of this domain knowledge. We then present the construction of hidden Markov models to investigate temporal relationships among the trust-related nonverbal cues. By interpreting the resulting learned structure, we observe that models built to emulate different levels of trust exhibit different sequences of nonverbal cues. From this observation, we derived sequence-based temporal features that further improve the accuracy of our computational model. Our multi-step research process presented in this paper combines the strength of experimental manipulation and machine learning to not only design a computational trust model but also to further our understanding of the dynamics of interpersonal trust.

  4. Consulting room computers and their effect on general practitioner-patient communication.

    Science.gov (United States)

    Noordman, Janneke; Verhaak, Peter; van Beljouw, Ilse; van Dulmen, Sandra

    2010-12-01

    in the western medical world, computers form part of the standard equipment in the consulting rooms of most GPs. As the use of a computer requires time and attention from GPs, this may well interfere with the communication process. Yet, the information accessed on the computer may also enhance communication. the present study affords insight into the relationship between computer use and GP-patient communication recorded by the same GPs over two periods. videotaped GP consultations collected in 2001 and 2008 were used to observe computer use and GP-patient communication. In addition, patients questionnaires about their experiences with communication by the GP were analysed using multilevel models with patients (Level 1) nested within GPs (Level 2). both in 2008 and in 2001, GPs used their computer in almost every consultation. Still, our study showed a change in computer use by the GPs over time. In addition, the results indicate that computer use is negatively related to some communication aspects: the patient-directed gaze of the GP and the amount of information given by GPs. There is also a negative association between computer use and the body posture of the GP. Computer use by GPs is not associated with other (analysed) non-verbal and verbal behaviour of GPs and patients. Moreover, computer use is scarcely related to patients' experiences with the communication behaviour of the GP. GPs show greater reluctance to use computers in 2008 compared to 2001. Computer use can indeed affect the communication between GPs and patients. Therefore, GPs ought to remain aware of their computer use during consultations and at the same time keep the interaction with the patient alive.

  5. Computational Analysis of Residue Interaction Networks and Coevolutionary Relationships in the Hsp70 Chaperones: A Community-Hopping Model of Allosteric Regulation and Communication.

    Directory of Open Access Journals (Sweden)

    Gabrielle Stetz

    2017-01-01

    Full Text Available Allosteric interactions in the Hsp70 proteins are linked with their regulatory mechanisms and cellular functions. Despite significant progress in structural and functional characterization of the Hsp70 proteins fundamental questions concerning modularity of the allosteric interaction networks and hierarchy of signaling pathways in the Hsp70 chaperones remained largely unexplored and poorly understood. In this work, we proposed an integrated computational strategy that combined atomistic and coarse-grained simulations with coevolutionary analysis and network modeling of the residue interactions. A novel aspect of this work is the incorporation of dynamic residue correlations and coevolutionary residue dependencies in the construction of allosteric interaction networks and signaling pathways. We found that functional sites involved in allosteric regulation of Hsp70 may be characterized by structural stability, proximity to global hinge centers and local structural environment that is enriched by highly coevolving flexible residues. These specific characteristics may be necessary for regulation of allosteric structural transitions and could distinguish regulatory sites from nonfunctional conserved residues. The observed confluence of dynamics correlations and coevolutionary residue couplings with global networking features may determine modular organization of allosteric interactions and dictate localization of key mediating sites. Community analysis of the residue interaction networks revealed that concerted rearrangements of local interacting modules at the inter-domain interface may be responsible for global structural changes and a population shift in the DnaK chaperone. The inter-domain communities in the Hsp70 structures harbor the majority of regulatory residues involved in allosteric signaling, suggesting that these sites could be integral to the network organization and coordination of structural changes. Using a network-based formalism of

  6. Fault Detection of Computer Communication Networks Using an Expert System

    Directory of Open Access Journals (Sweden)

    Ibrahiem M.M. El Emary

    2005-01-01

    Full Text Available The main objective of this study was to build an expert system for assisting the network administrator in his work of management and administration of the computer communication network. Theory of operation of the proposed expert system depends on using a time series model capable of forecasting the various performance parameters as: delay, utilization and collision frequency. When the expert system finds a difference (with certain tolerance between the predicted value and the measured value, it informs the network administrator that there exist problems in his network either in the switch or link or router. We examine two types of network by our proposed expert system, the first one is called token bus while the second one is called token ring. When we run our expert system on these two types of computer networks, actually the expert system captures the problem when there exists an excess deviation from the network performance parameters.

  7. A Model of Internal Communication in Adaptive Communication Systems.

    Science.gov (United States)

    Williams, M. Lee

    A study identified and categorized different types of internal communication systems and developed an applied model of internal communication in adaptive organizational systems. Twenty-one large organizations were selected for their varied missions and diverse approaches to managing internal communication. Individual face-to-face or telephone…

  8. Data communication at the CERN computer centre

    CERN Document Server

    Bruins, T; Pieters, R; Slettenhaar, Hendrik J; Van de Kerk, P

    1972-01-01

    The growing interest for on-line computer service and process control at CERN decentralises certain computer activities. Small process computers, remote batch stations and user terminals are to be backed by a powerful central computer. The present data network is principally star shaped. At the centre of it is a CDC 6600-6500 computer combination. It has a front end CDC 3100 computer with a Hewlett Packard 2116 as multiplexer. Some details about the fast parallel connections between the CDC 3100 and the HP 2116B are given in the paper, as well as descriptions of some computer simulation techniques used to test the present systems. Finally some plans on a future network are given. (12 refs).

  9. Lay Theories Regarding Computer-Mediated Communication in Remote Collaboration

    Directory of Open Access Journals (Sweden)

    Karl Parke

    2017-03-01

    Full Text Available Computer-mediated communication and remote collaboration has become an unexceptional norm as an educational modality for distance and open education, therefore the need to research and analyze students' online learning experience is necessary. This paper seeks to examine the assumptions and expectations held by students in regard to computer-mediated communication and how their lay theories developed and changed within the context of their practical experiences in conducting a remote collaborative project, through computer-mediated communication. We conducted a qualitative content analysis of students' final reports from an inter-institutional online course on computer-mediated communication and remote collaboration. The results show that students’ assumptions were altered and indicate the strong benefits of teaching how to collaborate remotely, especially if a blended approach of theory and practical application are combined.

  10. Leveraging mobile computing and communication technologies in education

    DEFF Research Database (Denmark)

    Annan, Nana Kofi

    The emergence of mobile computing and communication technologies has come with it, an unprecedented transformation in digitalising every aspect of human activities. This transformation has brought about a high degree of mobility in the way knowledge is constructed, processed, stored...... and disseminated through the use of portable information and communication technologies (ICTs) such as smart phones, tablets, personal computers and laptop computers. These mobile devices use mobile communication infrastructure to promote the mobility affordances for human activities anywhere and anytime. Although...... education and technology have evolved in tandem over the past years, this dissertation recognises the lapse that there is, in not being able to effectively leverage technology to improve education delivery by most educators. The study appreciates the enormousness of mobile computing and communication...

  11. An Integrated Review of Emoticons in Computer-Mediated Communication

    OpenAIRE

    Aldunate, Nerea; González-Ibáñez, Roberto

    2017-01-01

    Facial expressions constitute a rich source of non-verbal cues in face-to-face communication. They provide interlocutors with resources to express and interpret verbal messages, which may affect their cognitive and emotional processing. Contrarily, computer-mediated communication (CMC), particularly text-based communication, is limited to the use of symbols to convey a message, where facial expressions cannot be transmitted naturally. In this scenario, people use emoticons as paralinguistic c...

  12. 1st International Conference on Intelligent Computing and Communication

    CERN Document Server

    Satapathy, Suresh; Sanyal, Manas; Bhateja, Vikrant

    2017-01-01

    The book covers a wide range of topics in Computer Science and Information Technology including swarm intelligence, artificial intelligence, evolutionary algorithms, and bio-inspired algorithms. It is a collection of papers presented at the First International Conference on Intelligent Computing and Communication (ICIC2) 2016. The prime areas of the conference are Intelligent Computing, Intelligent Communication, Bio-informatics, Geo-informatics, Algorithm, Graphics and Image Processing, Graph Labeling, Web Security, Privacy and e-Commerce, Computational Geometry, Service Orient Architecture, and Data Engineering.

  13. Leveraging Social Computing for Personalized Crisis Communication using Social Media.

    Science.gov (United States)

    Leykin, Dmitry; Aharonson-Daniel, Limor; Lahad, Mooli

    2016-03-24

    The extensive use of social media in modern life redefines social interaction and communication. Communication plays an important role in mitigating, or exacerbating, the psychological and behavioral responses to critical incidents and disasters. As recent disasters demonstrated, people tend to converge to social media during and following emergencies. Authorities can then use this media and other computational methods to gain insights from the public, mainly to enhance situational awareness, but also to improve their communication with the public and public adherence to instructions. The current review presents a conceptual framework for studying psychological aspects of crisis and risk communication using the social media through social computing. Advanced analytical tools can be integrated in the processes and objectives of crisis communication. The availability of the computational techniques can improve communication with the public by a process of Hyper-Targeted Crisis Communication. The review suggests that using advanced computational tools for target-audience profiling and linguistic matching in social media, can facilitate more sensitive and personalized emergency communication.

  14. Pervasive Computing and Communication Technologies for U-Learning

    Science.gov (United States)

    Park, Young C.

    2014-01-01

    The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…

  15. Pervasive Computing and Communication Technologies for U-Learning

    Science.gov (United States)

    Park, Young C.

    2014-01-01

    The development of digital information transfer, storage and communication methods influences a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or…

  16. Computer-Mediated Communication Modality and Psychological Well-Being

    Science.gov (United States)

    Ess, Brian C.

    2013-01-01

    The growth of Internet usage in American society has added new modes of communication, primarily through computer-mediated communication (CMC)on the Internet. Research on the relationship between Internet use and psychological well-being has been mixed and this study attempted to reconcile the discrepancies in results by exploring the…

  17. Incorporating Computer-Mediated Communication in Project Work

    Science.gov (United States)

    Musa, Faridah; Mohamed, Maslawati; Mufti, Norlaila; Latiff, Rozmel Abdul; Amin, Maryam Mohamad

    2015-01-01

    In line with the new trend of using computer-mediated communication (CMC) as an innovative technique in teaching and learning at higher institutions, Facebook as a channel of CMC was employed in carrying out a project work in an Academic Communication Course. For this project, students worked in groups to discuss their work and share information…

  18. Distributed computing system with dual independent communications paths between computers and employing split tokens

    Science.gov (United States)

    Rasmussen, Robert D. (Inventor); Manning, Robert M. (Inventor); Lewis, Blair F. (Inventor); Bolotin, Gary S. (Inventor); Ward, Richard S. (Inventor)

    1990-01-01

    This is a distributed computing system providing flexible fault tolerance; ease of software design and concurrency specification; and dynamic balance of the loads. The system comprises a plurality of computers each having a first input/output interface and a second input/output interface for interfacing to communications networks each second input/output interface including a bypass for bypassing the associated computer. A global communications network interconnects the first input/output interfaces for providing each computer the ability to broadcast messages simultaneously to the remainder of the computers. A meshwork communications network interconnects the second input/output interfaces providing each computer with the ability to establish a communications link with another of the computers bypassing the remainder of computers. Each computer is controlled by a resident copy of a common operating system. Communications between respective ones of computers is by means of split tokens each having a moving first portion which is sent from computer to computer and a resident second portion which is disposed in the memory of at least one of computer and wherein the location of the second portion is part of the first portion. The split tokens represent both functions to be executed by the computers and data to be employed in the execution of the functions. The first input/output interfaces each include logic for detecting a collision between messages and for terminating the broadcasting of a message whereby collisions between messages are detected and avoided.

  19. 2nd International Conference on Computer and Communication Technologies

    CERN Document Server

    Raju, K; Mandal, Jyotsna; Bhateja, Vikrant

    2016-01-01

    The book is about all aspects of computing, communication, general sciences and educational research covered at the Second International Conference on Computer & Communication Technologies held during 24-26 July 2015 at Hyderabad. It hosted by CMR Technical Campus in association with Division – V (Education & Research) CSI, India. After a rigorous review only quality papers are selected and included in this book. The entire book is divided into three volumes. Three volumes cover a variety of topics which include medical imaging, networks, data mining, intelligent computing, software design, image processing, mobile computing, digital signals and speech processing, video surveillance and processing, web mining, wireless sensor networks, circuit analysis, fuzzy systems, antenna and communication systems, biomedical signal processing and applications, cloud computing, embedded systems applications and cyber security and digital forensic. The readers of these volumes will be highly benefited from the te...

  20. Cloud Computing in Mobile Communication Networks

    Institute of Scientific and Technical Information of China (English)

    Xinzhi Ouyang

    2011-01-01

    Cloud computing makes computing power universally available and provides flexibility in resource acquisition. It allows for scalable provision of services and more reasonable use of resources. This article considers cloud service deployment and virtualization from the perspective of mobile operators. A solution is proposed that allows mobile operators to maximize profits with minimal investment,

  1. Art and Technology of Entertainment Computing and Communication

    CERN Document Server

    Cheok, Adrian David

    2010-01-01

    "Art and Technology of Entertainment Computing and Communication" takes a blue sky research perspective on the field of interactive media for entertainment computing. Adrian David Cheok argues that entertainment as an end-product is useful for interactive play, however it is also a powerful tool for learning and communication and it is also a key driver for the development of information technology. This book explores the future of entertainment technologies used for communication and describes quantum step research. It will inform and inspire readers to create their own radical inve

  2. Understanding Student Computational Thinking with Computational Modeling

    CERN Document Server

    Aiken, John M; Douglas, Scott S; Burk, John B; Scanlon, Erin M; Thoms, Brian D; Schatz, Michael F

    2012-01-01

    Recently, the National Research Council's framework for next generation science standards highlighted "computational thinking" as one of its "fundamental practices". Students taking a physics course that employed the Arizona State University's Modeling Instruction curriculum were taught to construct computational models of physical systems. Student computational thinking was assessed using a proctored programming assignment, written essay, and a series of think-aloud interviews, where the students produced and discussed a computational model of a baseball in motion via a high-level programming environment (VPython). Roughly a third of the students in the study were successful in completing the programming assignment. Student success on this assessment was tied to how students synthesized their knowledge of physics and computation. On the essay and interview assessments, students displayed unique views of the relationship between force and motion; those who spoke of this relationship in causal (rather than obs...

  3. INTERCULTURAL COMMUNICATION PATTERNS AND LANGUAGE USE IN COMPUTER MEDIATED-COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Adriana Teodorescu

    2012-11-01

    Full Text Available This paper aims at analyzing the degree to which intercultural communication patterns are embedded in computer-mediated communication. Drawing on Hall’s and Hofstede’s intercultural communication dimensions, this study evaluates empirically high-versus-low context cultural orientations as reflected in the electronic medium, namely the blog, in three different cultures. Cultural variation is also analyzed in linguistic features and communication style in a synchronous mode of communication, by investigating data from several popular blogs from Japan, Germany and Italy.

  4. Computationally modeling interpersonal trust

    OpenAIRE

    Jin Joo eLee; Brad eKnox; Jolie eBaumann; Cynthia eBreazeal; David eDeSteno

    2013-01-01

    We present a computational model capable of predicting—above human accuracy—the degree of trust a person has toward their novel partner by observing the trust-related nonverbal cues expressed in their social interaction. We summarize our prior work, in which we identify nonverbal cues that signal untrustworthy behavior and also demonstrate the human mind’s readiness to interpret those cues to assess the trustworthiness of a social robot. We demonstrate that domain knowledge gained from our pr...

  5. Taking Computer-Mediated Communication(CMC) As Electronic Genre

    Institute of Scientific and Technical Information of China (English)

    黄静雅

    2009-01-01

    The concept of genre has changed considerably over the last several decades. Computer-mediated communica-tion (CMC) refers to any form of communication enabled through the use of computers. It includes not only person-to-person and person-to-group communication, but also person-to-remote-computer contacts, as when individuals read or download documents on the World Wide Web. The following essay is looking at on-line discourse through the frame of genre suggests a focus on:he regularities of form and content of the communication;the nature of the discourse communi- ty;the underlying expectations and conventions.From the view of situated genre theory, CMC has many defining characteristics distinguishing it from any other off-line genre.

  6. Constructivism and Computer-Mediated Communication in Distance Education.

    Science.gov (United States)

    Jonassen, David; And Others

    1995-01-01

    Describes the assumptions of a constructivist epistemology, contrasts them with objectivist assumptions, and describes instructional systems that can support constructive learning at a distance. Highlights include paradigm shifts in learning and instructional design theory; computer-mediated communication; computer-supported collaborative work;…

  7. Path Models of Vocal Emotion Communication.

    Directory of Open Access Journals (Sweden)

    Tanja Bänziger

    Full Text Available We propose to use a comprehensive path model of vocal emotion communication, encompassing encoding, transmission, and decoding processes, to empirically model data sets on emotion expression and recognition. The utility of the approach is demonstrated for two data sets from two different cultures and languages, based on corpora of vocal emotion enactment by professional actors and emotion inference by naïve listeners. Lens model equations, hierarchical regression, and multivariate path analysis are used to compare the relative contributions of objectively measured acoustic cues in the enacted expressions and subjective voice cues as perceived by listeners to the variance in emotion inference from vocal expressions for four emotion families (fear, anger, happiness, and sadness. While the results confirm the central role of arousal in vocal emotion communication, the utility of applying an extended path modeling framework is demonstrated by the identification of unique combinations of distal cues and proximal percepts carrying information about specific emotion families, independent of arousal. The statistical models generated show that more sophisticated acoustic parameters need to be developed to explain the distal underpinnings of subjective voice quality percepts that account for much of the variance in emotion inference, in particular voice instability and roughness. The general approach advocated here, as well as the specific results, open up new research strategies for work in psychology (specifically emotion and social perception research and engineering and computer science (specifically research and development in the domain of affective computing, particularly on automatic emotion detection and synthetic emotion expression in avatars.

  8. Path Models of Vocal Emotion Communication.

    Science.gov (United States)

    Bänziger, Tanja; Hosoya, Georg; Scherer, Klaus R

    2015-01-01

    We propose to use a comprehensive path model of vocal emotion communication, encompassing encoding, transmission, and decoding processes, to empirically model data sets on emotion expression and recognition. The utility of the approach is demonstrated for two data sets from two different cultures and languages, based on corpora of vocal emotion enactment by professional actors and emotion inference by naïve listeners. Lens model equations, hierarchical regression, and multivariate path analysis are used to compare the relative contributions of objectively measured acoustic cues in the enacted expressions and subjective voice cues as perceived by listeners to the variance in emotion inference from vocal expressions for four emotion families (fear, anger, happiness, and sadness). While the results confirm the central role of arousal in vocal emotion communication, the utility of applying an extended path modeling framework is demonstrated by the identification of unique combinations of distal cues and proximal percepts carrying information about specific emotion families, independent of arousal. The statistical models generated show that more sophisticated acoustic parameters need to be developed to explain the distal underpinnings of subjective voice quality percepts that account for much of the variance in emotion inference, in particular voice instability and roughness. The general approach advocated here, as well as the specific results, open up new research strategies for work in psychology (specifically emotion and social perception research) and engineering and computer science (specifically research and development in the domain of affective computing, particularly on automatic emotion detection and synthetic emotion expression in avatars).

  9. Patterns of Programmers' Use of Computer-Mediated Communications Systems

    Directory of Open Access Journals (Sweden)

    Chatpong Tangmanee

    2003-11-01

    Full Text Available Communication behavior of programmers plays an essential role in success of software development. Computer-mediated communication (CMC system, such as e-mail, or the World Wide Web (WWW, have substantial implications for coordinating work of programmers. Yet, no studies have dealt systematically with CMC behaviors of programmers. Drawing upon theories in organizational studies, information science, computer-mediated communication and software engineering, this research examines what programmers accomplish through CMC systems. Data were gathered from survey questionnaires mailed to 730 programmers, who are members of the Association of Computing Machinery (ACM and are involved in a variety of programming work. Based on factor analysis, the study found that programmers use CMC systems (1 to achieve progress in work-related tasks (i.e., task-related purposes, (2 to satisfy their social and emotional needs (i.e., socio-emotional purposes, and (3 to explore for information (i.e., exploring purposes. The findings of this research extend an insight into important patterns for which programmers use CMC systems. This insight has advanced theories of computer-mediated communication in the context of computer programmers. Also, practitioners, especially in software development, may use the results as guidelines in fostering a firm’s feasible network policy that fits with what their programming staff accomplish through computer-mediated communication.

  10. WebCom: A Model for Understanding Web Site Communication

    DEFF Research Database (Denmark)

    Godsk, Mikkel; Petersen, Anja Bechmann

    2008-01-01

    This chapter presents a model (WebCom) for understanding and analyzing Web site-mediated communication, also referred to as Web site communication. The model combines three theoretical approaches - communication, medium, and activity theory - into one generic model that benefits from each...... of the approaches' strengths. Furthermore, it is discussed and shortly demonstrated how WebCom can be used for analytical and design purposes with YouTube as an example. The chapter concludes that WebCom is able to serve as a theoretically-based model for understanding complex Web site communication situations...... in their entirety, and that such thoroughly approach is required for successful computer mediated communication (CMC) when communicating across cultures and contexts....

  11. LHCb computing model

    CERN Document Server

    Frank, M; Pacheco, Andreu

    1998-01-01

    This document is a first attempt to describe the LHCb computing model. The CPU power needed to process data for the event filter and reconstruction is estimated to be 2.2 \\Theta 106 MIPS. This will be installed at the experiment and will be reused during non data-taking periods for reprocessing. The maximal I/O of these activities is estimated to be around 40 MB/s.We have studied three basic models concerning the placement of the CPU resources for the other computing activities, Monte Carlo-simulation (1:4 \\Theta 106 MIPS) and physics analysis (0:5 \\Theta 106 MIPS): CPU resources may either be located at the physicist's homelab, national computer centres (Regional Centres) or at CERN.The CPU resources foreseen for analysis are sufficient to allow 100 concurrent analyses. It is assumed that physicists will work in physics groups that produce analysis data at an average rate of 4.2 MB/s or 11 TB per month. However, producing these group analysis data requires reading capabilities of 660 MB/s. It is further assu...

  12. Pair Interactions and Mode of Communication: Comparing Face-to-Face and Computer Mediated Communication

    Science.gov (United States)

    Tan, Lan Liana; Wigglesworth, Gillian; Storch, Neomy

    2010-01-01

    In today's second language classrooms, students are often asked to work in pairs or small groups. Such collaboration can take place face-to-face, but now more often via computer mediated communication. This paper reports on a study which investigated the effect of the medium of communication on the nature of pair interaction. The study involved…

  13. Learners' Willingness to Communicate in Face-to-Face versus Oral Computer-Mediated Communication

    Science.gov (United States)

    Yanguas, Íñigo; Flores, Alayne

    2014-01-01

    The present study had two main goals: to explore performance differences in a task-based environment between face-to-face (FTF) and oral computer-mediated communication (OCMC) groups, and to investigate the relationship between trait-like willingness to communicate (WTC) and performance in the FTF and OCMC groups. Students from two intact…

  14. The Antares computing model

    Energy Technology Data Exchange (ETDEWEB)

    Kopper, Claudio, E-mail: claudio.kopper@nikhef.nl [NIKHEF, Science Park 105, 1098 XG Amsterdam (Netherlands)

    2013-10-11

    Completed in 2008, Antares is now the largest water Cherenkov neutrino telescope in the Northern Hemisphere. Its main goal is to detect neutrinos from galactic and extra-galactic sources. Due to the high background rate of atmospheric muons and the high level of bioluminescence, several on-line and off-line filtering algorithms have to be applied to the raw data taken by the instrument. To be able to handle this data stream, a dedicated computing infrastructure has been set up. The paper covers the main aspects of the current official Antares computing model. This includes an overview of on-line and off-line data handling and storage. In addition, the current usage of the “IceTray” software framework for Antares data processing is highlighted. Finally, an overview of the data storage formats used for high-level analysis is given.

  15. Satellite communication performance evaluation: Computational techniques based on moments

    Science.gov (United States)

    Omura, J. K.; Simon, M. K.

    1980-01-01

    Computational techniques that efficiently compute bit error probabilities when only moments of the various interference random variables are available are presented. The approach taken is a generalization of the well known Gauss-Quadrature rules used for numerically evaluating single or multiple integrals. In what follows, basic algorithms are developed. Some of its properties and generalizations are shown and its many potential applications are described. Some typical interference scenarios for which the results are particularly applicable include: intentional jamming, adjacent and cochannel interferences; radar pulses (RFI); multipath; and intersymbol interference. While the examples presented stress evaluation of bit error probilities in uncoded digital communication systems, the moment techniques can also be applied to the evaluation of other parameters, such as computational cutoff rate under both normal and mismatched receiver cases in coded systems. Another important application is the determination of the probability distributions of the output of a discrete time dynamical system. This type of model occurs widely in control systems, queueing systems, and synchronization systems (e.g., discrete phase locked loops).

  16. Improving Undergraduates' Critique via Computer Mediated Communication

    Science.gov (United States)

    Mohamad, Maslawati; Musa, Faridah; Amin, Maryam Mohamed; Mufti, Norlaila; Latiff, Rozmel Abdul; Sallihuddin, Nani Rahayu

    2014-01-01

    Our current university students, labeled as "Generation Y" or Millennials, are different from previous generations due to wide exposure to media. Being technologically savvy, they are accustomed to Internet for information and social media for socializing. In line with this current trend, teaching through computer mediated communication…

  17. 1st International Conference on Intelligent Computing, Communication and Devices

    CERN Document Server

    Patnaik, Srikanta; Ichalkaranje, Nikhil

    2015-01-01

    In the history of mankind, three revolutions which impact the human life are the tool-making revolution, agricultural revolution and industrial revolution. They have transformed not only the economy and civilization but the overall development of the society. Probably, intelligence revolution is the next revolution, which the society will perceive in the next 10 years. ICCD-2014 covers all dimensions of intelligent sciences, i.e. Intelligent Computing, Intelligent Communication and Intelligent Devices. This volume covers contributions from Intelligent Communication which are from the areas such as Communications and Wireless Ad Hoc & Sensor Networks, Speech & Natural Language Processing, including Signal, Image and Video Processing and Mobile broadband and Optical networks, which are the key to the ground-breaking inventions to intelligent communication technologies. Secondly, Intelligent Device is any type of equipment, instrument, or machine that has its own computing capability. Contributions from ...

  18. DNA computing models

    CERN Document Server

    Ignatova, Zoya; Zimmermann, Karl-Heinz

    2008-01-01

    In this excellent text, the reader is given a comprehensive introduction to the field of DNA computing. The book emphasizes computational methods to tackle central problems of DNA computing, such as controlling living cells, building patterns, and generating nanomachines.

  19. 77 FR 52759 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Science.gov (United States)

    2012-08-30

    ... COMMISSION Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and... importation of certain wireless communication devices, portable music and data processing devices, computers... to a data communications system.'' The Commission has determined to affirm the ID's finding...

  20. 78 FR 1247 - Certain Electronic Devices, Including Wireless Communication Devices, Tablet Computers, Media...

    Science.gov (United States)

    2013-01-08

    ... COMMISSION Certain Electronic Devices, Including Wireless Communication Devices, Tablet Computers, Media... importation of certain electronic devices, including wireless communication devices, tablet computers, media... United States after importation of certain electronic devices, including wireless communication...

  1. 77 FR 58576 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers...

    Science.gov (United States)

    2012-09-21

    ... COMMISSION Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers, and... importation of certain wireless communication devices, portable music and data processing devices, computers... after importation of certain wireless communication devices, portable music and data processing...

  2. 77 FR 51571 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers...

    Science.gov (United States)

    2012-08-24

    ... COMMISSION Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers, and... communication devices, portable music and data processing devices, computers, and components thereof. The.... International Trade Commission has received a complaint entitled Wireless Communication Devices, Portable...

  3. 78 FR 12785 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Science.gov (United States)

    2013-02-25

    ... COMMISSION Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and... communication devices, portable music and data processing devices, computers and components thereof by reason of... evidence demonstrates that the existence of portable communication devices using ``touch sensitive...

  4. LIVING LONG-DISTANCE RELATIONSHIPS THROUGH COMPUTER-MEDIATED COMMUNICATION

    OpenAIRE

    Almond Pilar N. Aguila

    2009-01-01

    Overseas Filipino Workers (OFWs) and their loved ones in thePhilippines manage to have dynamic relationships despite physical distance with Computer-Mediated Communication (CMC) or the use of new media (the Internet and cellular phone). Theoretically guided by Marshall McLuhan and Stuart Hall, this paper presents three case studies that depict how individuals mindfully use communication technology to enact their relationships. Such interactions also entail the exchange of new ideas on gender ...

  5. LIVING LONG-DISTANCE RELATIONSHIPS THROUGH COMPUTER-MEDIATED COMMUNICATION

    OpenAIRE

    Almond Pilar N. Aguila

    2009-01-01

    Overseas Filipino Workers (OFWs) and their loved ones in thePhilippines manage to have dynamic relationships despite physical distance with Computer-Mediated Communication (CMC) or the use of new media (the Internet and cellular phone). Theoretically guided by Marshall McLuhan and Stuart Hall, this paper presents three case studies that depict how individuals mindfully use communication technology to enact their relationships. Such interactions also entail the exchange of new ideas on gender ...

  6. 2014 National Workshop on Advances in Communication and Computing

    CERN Document Server

    Prasanna, S; Sarma, Kandarpa; Saikia, Navajit

    2015-01-01

    The present volume is a compilation of research work in computation, communication, vision sciences, device design, fabrication, upcoming materials and related process design, etc. It is derived out of selected manuscripts submitted to the 2014 National Workshop on Advances in Communication and Computing (WACC 2014), Assam Engineering College, Guwahati, Assam, India which is emerging out to be a premier platform for discussion and dissemination of knowhow in this part of the world. The papers included in the volume are indicative of the recent thrust in computation, communications and emerging technologies. Certain recent advances in ZnO nanostructures for alternate energy generation provide emerging insights into an area that has promises for the energy sector including conservation and green technology. Similarly, scholarly contributions have focused on malware detection and related issues. Several contributions have focused on biomedical aspects including contributions related to cancer detection using act...

  7. The utilization of Computer Mediated Communication for case study collaboration.

    Science.gov (United States)

    Gwozdek, Anne E; Klausner, Christine P; Kerschbaum, Wendy E

    2008-01-01

    Computer Mediated Communication (CMC) can be used as an effective tool for student communication and collaboration. First-year, first-semester dental hygiene students self-selected groups to develop dental hygiene process of care treatment plans, written reports, and oral case presentations based on assigned clinical cases. In consultation with the University of Michigan (UM) Digital Media Commons Collaborative Technologies Teams, CMC options were identified. Two chat rooms were established within the UM's Course Management System (CTools) to provide opportunities for synchronous (simultaneous, real-time) communication. One course blog site and 8 case blog sites were developed to provide students and instructors with electronic asynchronous (nonsimultaneous) communication formats. The purpose of this study was to evaluate the effectiveness of these technologies during group case study projects. CMC has the potential to provide an effective means of collaboration and communication when the technologies align with the purpose of the project and compliment the dynamics of student groups.

  8. Victoria Stodden: Scholarly Communication in the Era of Big Data and Big Computation

    OpenAIRE

    2015-01-01

    Victoria Stodden gave the keynote address for Open Access Week 2015. "Scholarly communication in the era of big data and big computation" was sponsored by the University Libraries, Computational Modeling and Data Analytics, the Department of Computer Science, the Department of Statistics, the Laboratory for Interdisciplinary Statistical Analysis (LISA), and the Virginia Bioinformatics Institute. Victoria Stodden is an associate professor in the Graduate School of Library and Information Scien...

  9. Characterizing Computation-Communication Overlap in Message-Passing Systems

    Energy Technology Data Exchange (ETDEWEB)

    David E. Bernholdt; Jarek Nieplocha; P. Sadayappan; Aniruddha G. Shet; Vinod Tipparaju

    2008-01-31

    Effective overlap of computation and communication is a well understood technique for latency hiding and can yield significant performance gains for applications on high-end computers. In this report, we describe an instrumentation framework developed for messagepassing systems to characterize the degree of overlap of communication with computation in the execution of parallel applications. The inability to obtain precise time-stamps for pertinent communication events is a significant problem, and is addressed by generation of minimum and maximum bounds on achieved overlap. The overlap measures can aid application developers and system designers in investigating scalability issues. The approach has been used to instrument two MPI implementations as well as the ARMCI system. The implementation resides entirely within the communication library and thus integrates well with existing approaches that operate outside the library. The utility of the framework is demonstrated by analyzing communication-computation overlap for micro-benchmarks and the NAS benchmarks, and the insights obtained are used to modify the NAS SP benchmark, resulting in improved overlap.

  10. Characterizing Computation-Communication Overlap in Message-Passing Systems

    Energy Technology Data Exchange (ETDEWEB)

    David E. Bernholdt; Jarek Nieplocha; P. Sadayappan; Aniruddha G. Shet; Vinod Tipparaju

    2008-01-31

    Effective overlap of computation and communication is a well understood technique for latency hiding and can yield significant performance gains for applications on high-end computers. In this report, we describe an instrumentation framework developed for message-passing systems to characterize the degree of overlap of communication with computation in the execution of parallel applications. The inability to obtain precise time-stamps for pertinent communication events is a significant problem, and is addressed by generation of minimum and maximum bounds on achieved overlap. The overlap measures can aid application developers and system designers in investigating scalability issues. The approach has been used to instrument two MPI implementations as well as the ARMCI system. The implementation resides entirely within the communication library and thus integrates well with existing approaches that operate outside the library. The utility of the framework is demonstrated by analyzing communication-computation overlap for micro-benchmarks and the NAS benchmarks, and the insights obtained are used to modify the NAS SP benchmark, resulting in improved overlap.

  11. Integrating Computer-Mediated Communication into an EAP course

    Institute of Scientific and Technical Information of China (English)

    Li Xiao; Cao Ru-hua

    2006-01-01

    The development of the computer along with the widespread use of the Internet has rapidly promoted Computer-Mediated Communication (CMC) as a very important communication media,which can be used widely and effectively in foreign language teaching and learning.This essay tries to explore the advantages of CMC as well as its proposed application,beginning with the introduction of some concepts related to CMC.From the research history,the rationale of using CMC in foreign language learning is summarised.The context of an EAP course is introduced and some suggestions on using CMC in this course are proposed.

  12. 9th International Conference on Advanced Computing & Communication Technologies

    CERN Document Server

    Mandal, Jyotsna; Auluck, Nitin; Nagarajaram, H

    2016-01-01

    This book highlights a collection of high-quality peer-reviewed research papers presented at the Ninth International Conference on Advanced Computing & Communication Technologies (ICACCT-2015) held at Asia Pacific Institute of Information Technology, Panipat, India during 27–29 November 2015. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academia and industry present their original work and exchange ideas, information, techniques and applications in the field of Advanced Computing and Communication Technology.

  13. Development of the Integrated Communication Model

    Science.gov (United States)

    Ho, Hua-Kuo

    2008-01-01

    Human communication is a critical issue in personal life. It also should be the indispensable core element of general education curriculum in universities and colleges. Based on literature analysis and the author's clinical observation, the importance of human communication, functions of model, and often seen human communication models were…

  14. TCP-IP Model in Data Communication and Networking

    OpenAIRE

    Pranab Bandhu Nath; Md.Mofiz Uddin

    2015-01-01

    The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP/IP, because it’s most important protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP), were the first networking protocols defined in this standard. Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking mode...

  15. Model-Based Analysis of a Windmill Communication System

    DEFF Research Database (Denmark)

    Tjell, Simon

    2006-01-01

    This paper presents the experiences obtained from modeling and analyzing a real-world application of distributed embedded computing. The modeling language Coloured Petri Nets (CPN) has been applied to analyze the properties of a communication system in a windmill, which enables a group of embedded...... computers to share a group of variables. A CPN-based model of the system is used to analyze certain real-time properties of the system....

  16. Theoretical Modelling of Intercultural Communication Process

    Directory of Open Access Journals (Sweden)

    Mariia Soter

    2016-08-01

    Full Text Available The definition of the concepts of “communication”, “intercultural communication”, “model of communication” are analyzed in the article. The basic components of the communication process are singled out. The model of intercultural communication is developed. Communicative, behavioral and complex skills for optimal organization of intercultural communication, establishment of productive contact with a foreign partner to achieve mutual understanding, searching for acceptable ways of organizing interaction and cooperation for both communicants are highlighted in the article. It is noted that intercultural communication through interaction between people affects the development of different cultures’ aspects.

  17. Sex differences in perceived attributes of computer-mediated communication.

    Science.gov (United States)

    Harper, Vernon B

    2003-02-01

    Researchers have pointed to the influence of sex with respect to the attributes of the computer medium. The author elaborates upon possible sex differences in reference to perceived attributes of the computer medium, i.e., Richness, Accessibility, Velocity, Interactivity, Plasticity, and Immediacy. Data from both a pilot and main study are reported and interpreted. The pilot study included 78 participants, while the main study involved 211. The independent samples were composed of Communication Studies students enrolled at two Mid-Atlantic universities. Nine items with anchors of 1: strongly disagree and 7: strongly agree were taken from the 2000 Computer Mediated Communication Competence Scale of Spitzberg to assess the attributes of computer-mediated interaction. The results indicate that women scored higher than men on perceptions of Accessibility, Velocity, Interactivity, and Immediacy.

  18. Communication Lower Bounds for Distributed-Memory Computations

    DEFF Research Database (Denmark)

    Scquizzato, Michele; Silvestri, Francesco

    2014-01-01

    In this paper we propose a new approach to the study of the communication requirements of distributed computations, which advocates for the removal of the restrictive assumptions under which earlier results were derived. We illustrate our approach by giving tight lower bounds on the communication...... complexity required to solve several computational problems in a distributed-memory parallel machine, namely standard matrix multiplication, stencil computations, comparison sorting, and the Fast Fourier Transform. Our bounds rely only on a mild assumption on work distribution, and significantly strengthen...... previous results which require either the computation to be balanced among the processors, or specific initial distributions of the input data, or an upper bound on the size of processors' local memories....

  19. FY 1999 Blue Book: Computing, Information, and Communications: Networked Computing for the 21st Century

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — U.S.research and development R and D in computing, communications, and information technologies has enabled unprecedented scientific and engineering advances,...

  20. Plasticity modeling & computation

    CERN Document Server

    Borja, Ronaldo I

    2013-01-01

    There have been many excellent books written on the subject of plastic deformation in solids, but rarely can one find a textbook on this subject. “Plasticity Modeling & Computation” is a textbook written specifically for students who want to learn the theoretical, mathematical, and computational aspects of inelastic deformation in solids. It adopts a simple narrative style that is not mathematically overbearing, and has been written to emulate a professor giving a lecture on this subject inside a classroom. Each section is written to provide a balance between the relevant equations and the explanations behind them. Where relevant, sections end with one or more exercises designed to reinforce the understanding of the “lecture.” Color figures enhance the presentation and make the book very pleasant to read. For professors planning to use this textbook for their classes, the contents are sufficient for Parts A and B that can be taught in sequence over a period of two semesters or quarters.

  1. 1st International Conference on Internet Computing and Information Communications

    CERN Document Server

    Awasthi, Lalit; Masillamani, M; Sridhar, S

    2014-01-01

    The book presents high quality research papers presented by experts in the International Conference on Internet Computing and Information Communications 2012, organized by ICICIC Global organizing committee (on behalf of The CARD Atlanta, Georgia, CREATE Conferences Inc). The objective of this book is to present the latest work done in the field of Internet computing by researchers and industrial professionals across the globe. A step to reduce the research divide between developed and under developed countries.

  2. Online Social Presence: Score Validity of the Computer-Mediated Communication Questionnaire

    Science.gov (United States)

    Yen, Cherng-Jyh

    2008-01-01

    The purpose of this study was to conduct a confirmatory factor analysis of the Computer-Mediated Communication Questionnaire scores, using structural equation modeling, to assess the consistency between the empirical data and the hypothesized factor structure of the CMCQ in the proposed models, which is stipulated by the theoretical framework and…

  3. Social influence in computer-mediated communication : The effects of anonymity on group behavior

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Sakhel, K; de Groot, D

    2001-01-01

    Two studies examined hypotheses derived from a Social Identity model of Deindividuation Effects (SIDE) as applied to social influence in computer-mediated communication (CMC) in groups. This model predicts that anonymity can increase social influence if a common group identity is salient. In a first

  4. Computer-mediated communication as a channel for social resistance : The strategic side of SIDE

    NARCIS (Netherlands)

    Spears, R; Lea, M; Corneliussen, RA; Postmes, T; Ter Haar, W

    2002-01-01

    In two studies, the authors tested predictions derived from the social identity model of deindividuation effects (SIDE) concerning the potential of computer-mediated communication (CMC) to serve as a means to resist powerful out-groups. Earlier research using the SIDE model indicates that the anonym

  5. Optimization models of natural communication

    CERN Document Server

    Ferrer-i-Cancho, Ramon

    2014-01-01

    A family of information theoretic models of communication was introduced more than a decade ago to explain the origins of Zipf's law for word frequencies. The family is a based on a combination of two information theoretic principles: maximization of mutual information between forms and meanings and minimization of form entropy. The family also sheds light on the origins of three other patterns: the principle of contrast, a related a vocabulary learning bias and the meaning-frequency law. Here two important components of the family, namely the information theoretic principles and the energy function that combines them linearly, are reviewed from the perspective of psycholinguistics, language learning, information theory and synergetic linguistics. The minimization of this linear function resembles a sort of agnostic information theoretic model selection that might be tuned by self-organization.

  6. A randomized model for communicating embedded systems

    NARCIS (Netherlands)

    Bujorianu, M.C.; Bujorianu, L.M.

    2008-01-01

    Nowadays, there is an intense research activity in designing systems that operate in real life, physical environments. This research is spanned by various areas in computer science and engineering: embedded systems, reactive systems, wireless communications, hybrid systems, stochastic processes, etc

  7. A randomized model for communicating embedded systems

    NARCIS (Netherlands)

    Bujorianu, M.C.; Bujorianu, L.M.

    2008-01-01

    Nowadays, there is an intense research activity in designing systems that operate in real life, physical environments. This research is spanned by various areas in computer science and engineering: embedded systems, reactive systems, wireless communications, hybrid systems, stochastic processes,

  8. Synchronous-Voice Computer-Mediated Communication: Effects on Pronunciation

    Science.gov (United States)

    Bueno Alastuey, Maria Camino

    2010-01-01

    Communicative competence is the ultimate goal of most learners of a second language and intelligible pronunciation a fundamental part of it. Unfortunately, learners often lack the opportunity to explore how intelligible their speech is for different audiences. Our research investigates whether synchronous-voice computer-mediated communication…

  9. Two Studies Examining Argumentation in Asynchronous Computer Mediated Communication

    Science.gov (United States)

    Joiner, Richard; Jones, Sarah; Doherty, John

    2008-01-01

    Asynchronous computer mediated communication (CMC) would seem to be an ideal medium for supporting development in student argumentation. This paper investigates this assumption through two studies. The first study compared asynchronous CMC with face-to-face discussions. The transactional and strategic level of the argumentation (i.e. measures of…

  10. Lay Theories Regarding Computer-Mediated Communication in Remote Collaboration

    Science.gov (United States)

    Parke, Karl; Marsden, Nicola; Connolly, Cornelia

    2017-01-01

    Computer-mediated communication and remote collaboration has become an unexceptional norm as an educational modality for distance and open education, therefore the need to research and analyze students' online learning experience is necessary. This paper seeks to examine the assumptions and expectations held by students in regard to…

  11. Judgments of Gender in Computer-Mediated Communication.

    Science.gov (United States)

    Savicki, V.; Kelley, M.; Oesterreich, E.

    1999-01-01

    Describes a study of undergraduates that investigated the ability of readers of computer-mediated communication (CMC) such as electronic mail to identify the gender of the author when messages were selected for language characteristics identified in previous studies as being associated with both group development and gender. (Author/LRW)

  12. Using Computer-Mediated Communication (CMC) in Language Teaching

    Science.gov (United States)

    Goertler, Senta

    2009-01-01

    This article discusses how new and familiar computer technology tools can be used in a communicative language classroom. It begins by outlining the benefits and challenges of using such technology for language teaching in general, and it describes some sample activities that the author has used. Readers are shown how to implement various computer…

  13. How To Achieve Better Impressions in Computer-Mediated Communication?

    Science.gov (United States)

    Liu, Yuliang; Ginther, Dean

    This paper presents a review of the literature on impression formation in face-to-face (FtF) and computer-mediated communication (CMC) and provides impression management recommendations for CMC users in a variety of environments. The first section provides an introduction to impression formation. Factors affecting impression formation in FtF and…

  14. The Influence of Computer-Mediated Communication Systems on Community

    Science.gov (United States)

    Rockinson-Szapkiw, Amanda J.

    2012-01-01

    As higher education institutions enter the intense competition of the rapidly growing global marketplace of online education, the leaders within these institutions are challenged to identify factors critical for developing and for maintaining effective online courses. Computer-mediated communication (CMC) systems are considered critical to…

  15. Remote Viewing and Computer Communications--An Experiment.

    Science.gov (United States)

    Vallee, Jacques

    1988-01-01

    A series of remote viewing experiments were run with 12 participants who communicated through a computer conferencing network. The correct target sample was identified in 8 out of 33 cases. This represented more than double the pure chance expectation. Appendices present protocol, instructions, and results of the experiments. (Author/YP)

  16. Using Computer-Mediated Communication (CMC) in Language Teaching

    Science.gov (United States)

    Goertler, Senta

    2009-01-01

    This article discusses how new and familiar computer technology tools can be used in a communicative language classroom. It begins by outlining the benefits and challenges of using such technology for language teaching in general, and it describes some sample activities that the author has used. Readers are shown how to implement various computer…

  17. Models of optical quantum computing

    Directory of Open Access Journals (Sweden)

    Krovi Hari

    2017-03-01

    Full Text Available I review some work on models of quantum computing, optical implementations of these models, as well as the associated computational power. In particular, we discuss the circuit model and cluster state implementations using quantum optics with various encodings such as dual rail encoding, Gottesman-Kitaev-Preskill encoding, and coherent state encoding. Then we discuss intermediate models of optical computing such as boson sampling and its variants. Finally, we review some recent work in optical implementations of adiabatic quantum computing and analog optical computing. We also provide a brief description of the relevant aspects from complexity theory needed to understand the results surveyed.

  18. The 2004 Latsis Symposium: Quantum optics for Communication and Computing

    CERN Multimedia

    2004-01-01

    1-3 March 2004 Ecole Polytechnique Fédérale de Lausanne Auditoire SG1 The field of Quantum Optics covers topics that extend from basic physical concepts, regarding the quantum description of light, matter, and light-matter interaction, to the applications of these concepts in future information and communication technologies. This field is of primary importance for science and society for two reasons. Firstly, it brings a deeper physical understanding of the fundamental aspects of modern quantum physics. Secondly, it offers perspectives for the invention and implementation of new devices and systems in the fields of communications, information management and computing. The themes that will be addressed in the Latsis Symposium on Quantum Optics are quantum communications, quantum computation, and quantum photonic devices. The objective of the symposium is to give an overview of this fascinating and rapidly evolving field. The different talks will establish links between new fundamental c...

  19. The 2004 Latsis Symposium: Quantum optics for Communication and Computing

    CERN Multimedia

    2004-01-01

    1-3 March 2004 Ecole Polytechnique Fédérale de Lausanne Auditoire SG1 The field of Quantum Optics covers topics that extend from basic physical concepts, regarding the quantum description of light, matter, and light-matter interaction, to the applications of these concepts in future information and communication technologies. This field is of primary importance for science and society for two reasons. Firstly, it brings a deeper physical understanding of the fundamental aspects of modern quantum physics. Secondly, it offers perspectives for the invention and implementation of new devices and systems in the fields of communications, information management and computing. The themes that will be addressed in the Latsis Symposium on Quantum Optics are quantum communications, quantum computation, and quantum photonic devices. The objective of the symposium is to give an overview of this fascinating and rapidly evolving field. The different talks will establish links between new fundamental ...

  20. The 2004 Latsis Symposium: Quantum optics for Communication and Computing

    CERN Multimedia

    2004-01-01

    1-3 March 2004 Ecole Polytechnique Fédérale de Lausanne Auditoire SG1 The field of Quantum Optics covers topics that extend from basic physical concepts, regarding the quantum description of light, matter, and light-matter interaction, to the applications of these concepts in future information and communication technologies. This field is of primary importance for science and society for two reasons. Firstly, it brings a deeper physical understanding of the fundamental aspects of modern quantum physics. Secondly, it offers perspectives for the invention and implementation of new devices and systems in the fields of communications, information management and computing. The themes that will be addressed in the Latsis Symposium on Quantum Optics are quantum communications, quantum computation, and quantum photonic devices. The objective of the symposium is to give an overview of this fascinating and rapidly evolving field. The different talks will establish links between new fundamental...

  1. Queuing theory models for computer networks

    Science.gov (United States)

    Galant, David C.

    1989-01-01

    A set of simple queuing theory models which can model the average response of a network of computers to a given traffic load has been implemented using a spreadsheet. The impact of variations in traffic patterns and intensities, channel capacities, and message protocols can be assessed using them because of the lack of fine detail in the network traffic rates, traffic patterns, and the hardware used to implement the networks. A sample use of the models applied to a realistic problem is included in appendix A. Appendix B provides a glossary of terms used in this paper. This Ames Research Center computer communication network is an evolving network of local area networks (LANs) connected via gateways and high-speed backbone communication channels. Intelligent planning of expansion and improvement requires understanding the behavior of the individual LANs as well as the collection of networks as a whole.

  2. Performance evaluation of computer and communication systems

    CERN Document Server

    Le Boudec, Jean-Yves

    2011-01-01

    … written by a scientist successful in performance evaluation, it is based on his experience and provides many ideas not only to laymen entering the field, but also to practitioners looking for inspiration. The work can be read systematically as a textbook on how to model and test the derived hypotheses on the basis of simulations. Also, separate parts can be studied, as the chapters are self-contained. … the book can be successfully used either for self-study or as a supplementary book for a lecture. I believe that different types of readers will like it: practicing engineers and resea

  3. Computer-Mediated Communication: A vehicle for learning

    Directory of Open Access Journals (Sweden)

    Linda D. Grooms

    2003-10-01

    Full Text Available The axiom of humanity’s basic need to communicate provides the impetus to explore the nature and quality of computer-mediated communication as a vehicle for learning in higher education. This exploratory study examined the experiential communication perceptions of online doctoral students during the infancy of their program. Eighty-five students were electronically queried through a 32 item open-ended questionnaire within a 13 day time frame. Preliminary findings supported the experience of Seagren and Watwood (1996 at the Lincoln Campus of the University of Nebraska, that “more information widens learning opportunities, but without interaction, learning is not enhanced” (p. 514. The overarching implications stress that faculty development and instructional planning are essential for the effective delivery of online courses, and even more so when collaborative learning is used. Facilitating group communication and interaction are areas beckoning attention as we continue to effectively organize the online classroom of this new millennium.

  4. Modeling of digital communication systems using SIMULINK

    CERN Document Server

    Giordano, Arthur A

    2015-01-01

    Arthur Giordano, PhD, is a consultant in the field of military and commercial communications specializing in wireless communications. He is a co-founder of G5 Scientific, LLC, is a senior member of the IEEE and has taught graduate communications courses. He has developed numerous models using MathWorks®' SIMULINK®® to characterize digital communications systems. Allen Levesque, PhD, is a consultant specializing in digital communications systems, and is a partner in G5 Scientific, LLC. He has taught graduate courses in digital communications at Worcester Polytechnic Institute and is currently

  5. Secure Two-Party Computation with Low Communication

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Faust, Sebastian; Hazay, Carmit

    2011-01-01

    We propose a 2-party UC-secure computation protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the circuit description of the function, and the workload for one of the parties is also only poly......-logarithmic in the size of the circuit. This implies, for instance, delegatable computation that requires no expensive off-line phase and remains secure even if the server learns whether the client accepts its results. To achieve this, we define a notion of extractable hash functions, propose an instantiation based...

  6. An Integrated Review of Emoticons in Computer-Mediated Communication.

    Science.gov (United States)

    Aldunate, Nerea; González-Ibáñez, Roberto

    2016-01-01

    Facial expressions constitute a rich source of non-verbal cues in face-to-face communication. They provide interlocutors with resources to express and interpret verbal messages, which may affect their cognitive and emotional processing. Contrarily, computer-mediated communication (CMC), particularly text-based communication, is limited to the use of symbols to convey a message, where facial expressions cannot be transmitted naturally. In this scenario, people use emoticons as paralinguistic cues to convey emotional meaning. Research has shown that emoticons contribute to a greater social presence as a result of the enrichment of text-based communication channels. Additionally, emoticons constitute a valuable resource for language comprehension by providing expressivity to text messages. The latter findings have been supported by studies in neuroscience showing that particular brain regions involved in emotional processing are also activated when people are exposed to emoticons. To reach an integrated understanding of the influence of emoticons in human communication on both socio-cognitive and neural levels, we review the literature on emoticons in three different areas. First, we present relevant literature on emoticons in CMC. Second, we study the influence of emoticons in language comprehension. Finally, we show the incipient research in neuroscience on this topic. This mini review reveals that, while there are plenty of studies on the influence of emoticons in communication from a social psychology perspective, little is known about the neurocognitive basis of the effects of emoticons on communication dynamics.

  7. An Integrated Review of Emoticons in Computer-Mediated Communication

    Science.gov (United States)

    Aldunate, Nerea; González-Ibáñez, Roberto

    2017-01-01

    Facial expressions constitute a rich source of non-verbal cues in face-to-face communication. They provide interlocutors with resources to express and interpret verbal messages, which may affect their cognitive and emotional processing. Contrarily, computer-mediated communication (CMC), particularly text-based communication, is limited to the use of symbols to convey a message, where facial expressions cannot be transmitted naturally. In this scenario, people use emoticons as paralinguistic cues to convey emotional meaning. Research has shown that emoticons contribute to a greater social presence as a result of the enrichment of text-based communication channels. Additionally, emoticons constitute a valuable resource for language comprehension by providing expressivity to text messages. The latter findings have been supported by studies in neuroscience showing that particular brain regions involved in emotional processing are also activated when people are exposed to emoticons. To reach an integrated understanding of the influence of emoticons in human communication on both socio-cognitive and neural levels, we review the literature on emoticons in three different areas. First, we present relevant literature on emoticons in CMC. Second, we study the influence of emoticons in language comprehension. Finally, we show the incipient research in neuroscience on this topic. This mini review reveals that, while there are plenty of studies on the influence of emoticons in communication from a social psychology perspective, little is known about the neurocognitive basis of the effects of emoticons on communication dynamics.

  8. DYNAMIC TASK PARTITIONING MODEL IN PARALLEL COMPUTING

    Directory of Open Access Journals (Sweden)

    Javed Ali

    2012-04-01

    Full Text Available Parallel computing systems compose task partitioning strategies in a true multiprocessing manner. Such systems share the algorithm and processing unit as computing resources which leads to highly inter process communications capabilities. The main part of the proposed algorithm is resource management unit which performs task partitioning and co-scheduling .In this paper, we present a technique for integrated task partitioning and co-scheduling on the privately owned network. We focus on real-time and non preemptive systems. A large variety of experiments have been conducted on the proposed algorithm using synthetic and real tasks. Goal of computation model is to provide a realistic representation of the costs of programming The results show the benefit of the task partitioning. The main characteristics of our method are optimal scheduling and strong link between partitioning, scheduling and communication. Some important models for task partitioning are also discussed in the paper. We target the algorithm for task partitioning which improve the inter process communication between the tasks and use the recourses of the system in the efficient manner. The proposed algorithm contributes the inter-process communication cost minimization amongst the executing processes.

  9. Computing, information, and communications: Technologies for the 21. Century

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-01

    To meet the challenges of a radically new and technologically demanding century, the Federal Computing, Information, and Communications (CIC) programs are investing in long-term research and development (R and D) to advance computing, information, and communications in the United States. CIC R and D programs help Federal departments and agencies to fulfill their evolving missions, assure the long-term national security, better understand and manage the physical environment, improve health care, help improve the teaching of children, provide tools for lifelong training and distance learning to the workforce, and sustain critical US economic competitiveness. One of the nine committees of the National Science and Technology Council (NSTC), the Committee on Computing, Information, and Communications (CCIC)--through its CIC R and D Subcommittee--coordinates R and D programs conducted by twelve Federal departments and agencies in cooperation with US academia and industry. These R and D programs are organized into five Program Component Areas: (1) HECC--High End Computing and Computation; (2) LSN--Large Scale Networking, including the Next Generation Internet Initiative; (3) HCS--High Confidence Systems; (4) HuCS--Human Centered Systems; and (5) ETHR--Education, Training, and Human Resources. A brief synopsis of FY 1997 accomplishments and FY 1998 goals by PCA is presented. This report, which supplements the President`s Fiscal Year 1998 Budget, describes the interagency CIC programs.

  10. Tiling and Asynchronous Communication Optimizations for Stencil Computations

    KAUST Repository

    Malas, Tareq

    2015-12-07

    The importance of stencil-based algorithms in computational science has focused attention on optimized parallel implementations for multilevel cache-based processors. Temporal blocking schemes leverage the large bandwidth and low latency of caches to accelerate stencil updates and approach theoretical peak performance. A key ingredient is the reduction of data traffic across slow data paths, especially the main memory interface. Most of the established work concentrates on updating separate cache blocks per thread, which works on all types of shared memory systems, regardless of whether there is a shared cache among the cores. This approach is memory-bandwidth limited in several situations, where the cache space for each thread can be too small to provide sufficient in-cache data reuse. We introduce a generalized multi-dimensional intra-tile parallelization scheme for shared-cache multicore processors that results in a significant reduction of cache size requirements and shows a large saving in memory bandwidth usage compared to existing approaches. It also provides data access patterns that allow efficient hardware prefetching. Our parameterized thread groups concept provides a controllable trade-off between concurrency and memory usage, shifting the pressure between the memory interface and the Central Processing Unit (CPU).We also introduce efficient diamond tiling structure for both shared memory cache blocking and distributed memory relaxed-synchronization communication, demonstrated using one-dimensional domain decomposition. We describe the approach and our open-source testbed implementation details (called Girih), present performance results on contemporary Intel processors, and apply advanced performance modeling techniques to reconcile the observed performance with hardware capabilities. Furthermore, we conduct a comparison with the state-of-the-art stencil frameworks PLUTO and Pochoir in shared memory, using corner-case stencil operators. We study the

  11. High performance computing and communications: FY 1996 implementation plan

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-05-16

    The High Performance Computing and Communications (HPCC) Program was formally authorized by passage of the High Performance Computing Act of 1991, signed on December 9, 1991. Twelve federal agencies, in collaboration with scientists and managers from US industry, universities, and research laboratories, have developed the Program to meet the challenges of advancing computing and associated communications technologies and practices. This plan provides a detailed description of the agencies` HPCC implementation plans for FY 1995 and FY 1996. This Implementation Plan contains three additional sections. Section 3 provides an overview of the HPCC Program definition and organization. Section 4 contains a breakdown of the five major components of the HPCC Program, with an emphasis on the overall directions and milestones planned for each one. Section 5 provides a detailed look at HPCC Program activities within each agency.

  12. Models of Communication for Multicore Processors

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Sørensen, Rasmus Bo; Sparsø, Jens

    2015-01-01

    To efficiently use multicore processors we need to ensure that almost all data communication stays on chip, i.e., the bits moved between tasks executing on different processor cores do not leave the chip. Different forms of on-chip communication are supported by different hardware mechanism, e.......g., shared caches with cache coherency protocols, core-to-core networks-on-chip, and shared scratchpad memories. In this paper we explore the different hardware mechanism for on-chip communication and how they support or favor different models of communication. Furthermore, we discuss the usability...... of the different models of communication for real-time systems....

  13. Models of Communication for Multicore Processors

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Sørensen, Rasmus Bo; Sparsø, Jens

    2015-01-01

    To efficiently use multicore processors we need to ensure that almost all data communication stays on chip, i.e., the bits moved between tasks executing on different processor cores do not leave the chip. Different forms of on-chip communication are supported by different hardware mechanism, e.......g., shared caches with cache coherency protocols, core-to-core networks-on-chip, and shared scratchpad memories. In this paper we explore the different hardware mechanism for on-chip communication and how they support or favor different models of communication. Furthermore, we discuss the usability...... of the different models of communication for real-time systems....

  14. PETRI NET MODELING OF COMPUTER VIRUS LIFE CYCLE

    African Journals Online (AJOL)

    Dr Obe

    dynamic system analysis is applied to model the virus life cycle. Simulation of the .... of successful applications of Petri nets include distributed database systems, communication protocols, .... Concepts and Design". McGraw-Hill Computer.

  15. Computational modeling of concrete flow

    DEFF Research Database (Denmark)

    Roussel, Nicolas; Geiker, Mette Rica; Dufour, Frederic

    2007-01-01

    This paper provides a general overview of the present status regarding computational modeling of the flow of fresh concrete. The computational modeling techniques that can be found in the literature may be divided into three main families: single fluid simulations, numerical modeling of discrete...

  16. A Novel Forensic Computing Model

    Institute of Scientific and Technical Information of China (English)

    XU Yunfeng; LU Yansheng

    2006-01-01

    According to the requirement of computer forensic and network forensic, a novel forensic computing model is presented, which exploits XML/OEM/RM data model, Data fusion technology, forensic knowledgebase, inference mechanism of expert system and evidence mining engine. This model takes advantage of flexility and openness, so it can be widely used in mining evidence.

  17. Model and Implementation of Communication Link Management Supporting High Availability

    Institute of Scientific and Technical Information of China (English)

    Luo Juan; Cao Yang; He Zheng; Li Feng

    2004-01-01

    Despite the rapid evolution in all aspects of computer technology, both the computer hardware and software are prone to numerous failure conditions. In this paper, we analyzed the characteristic of a computer system and the methods of constructing a system , proposed a communication link management model supporting high availability for network applications, Which will greatly increase the high availability of network applications. Then we elaborated on heartbeat or service detect, fail-over, service take-over, switchback and error recovery process of the model. In the process of constructing the communication link, we implemented the link management and service take-over with high availability requirement, and discussed the state and the state transition of building the communication link between the hosts, depicted the message transfer and the start of timer. At Last, we applied the designed high availability system to a network billing system, and showed how the system was constructed and implemented, which perfectly satisfied the system requirements.

  18. The benefits of computer-mediated communication in nursing research.

    Science.gov (United States)

    East, Leah; Jackson, Debra; O'Brien, Louise; Peters, Kathleen

    2008-08-01

    Use of the Internet, and the opportunity to utilise computer-mediated communication (CMC) provides new alternatives for nurse researchers to collect data. The use of CMC for research purposes is advantageous for both researchers and participants. Through this mode of communication, recruitment of participants can be enhanced through reaching individuals who are geographically distant, and nurses have the opportunity to provide participants with true anonymity, which may be beneficial when exploring sensitive issues. This paper explores the existing literature and draws on healthcare studies that have used CMC as a data collection tool.

  19. Computer-Aided Modeling Framework

    DEFF Research Database (Denmark)

    Fedorova, Marina; Sin, Gürkan; Gani, Rafiqul

    development and application. The proposed work is a part of the project for development of methods and tools that will allow systematic generation, analysis and solution of models for various objectives. It will use the computer-aided modeling framework that is based on a modeling methodology, which combines....... In this contribution, the concept of template-based modeling is presented and application is highlighted for the specific case of catalytic membrane fixed bed models. The modeling template is integrated in a generic computer-aided modeling framework. Furthermore, modeling templates enable the idea of model reuse...... are generated through the template in ICAS-MoT and translated into a model object. Once in ICAS-MoT, the model is numerical analyzed, solved and identified. A computer-aided modeling framework integrating systematic model derivation and development tools has been developed. It includes features for model...

  20. Computing the threshold of the influence of intercellular nanotubes on cell-to-cell communication integrity

    Science.gov (United States)

    Mihailović, Dragutin T.; Kostić, Vladimir R.; Balaž, Igor; Kapor, Darko

    2016-10-01

    We examine the threshold of the influence of the tunneling nanotubes (TNTs) on the cell-to-cell communication integrity. A deterministic model is introduced with the Michaelis-Menten dynamics and the intercellular exchange of substance. The influence of TNTs are considered as a functional perturbation of the main communication and treated as the matrix nearness problems. We analyze communication integrity in terms of the \\emph{pseudospectra} of the exchange, to find the \\emph{distance to instability}. The threshold of TNTs influence is computed for Newman-Gastner and Erd\\H{o}s-R\\'enyi gap junction (GJ) networks.

  1. Computer Communications, Cooperation or Confusion; A Communications Conference at San Jose State College.

    Science.gov (United States)

    San Jose State Coll., CA.

    The papers from a conference on computer communication networks are divided into five groups--trends, applications, problems and impairments, solutions and tools, impact on society and education. The impact of such developing technologies as cable television, the "wired nation," the telephone industry, and analog data storage is projected. Various…

  2. Computational modeling in biomechanics

    CERN Document Server

    Mofrad, Mohammad

    2010-01-01

    This book provides a glimpse of the diverse and important roles that modern computational technology is playing in various areas of biomechanics. It includes unique chapters on ab initio quantum mechanical, molecular dynamic and scale coupling methods..

  3. TEACHER IMMEDIACY BEHAVIORS AND PARTICIPATION IN COMPUTER MEDIATED COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Mestan KUCUK

    2009-04-01

    Full Text Available Few concepts in instructional communication literature have received as much attention as teacher immediacy. However, educational communication scholars have thoroughly studied immediacy behaviors mainly in traditional classrooms and these studies are mostly related to student attitudes and learning. Thanks to some growing attempts, recent research has extended these findings to distance education. The difference of this study is to examine the relationship between teacher immediacy behaviors and participation in an online setting. Results indicated that affective and interactive indicators were the least used immediacy behaviors while cohesive indicators were mostly used by teacher in this case. Also data show that teachers’ interactive immediacy behaviors and immediate feedback determine students’ participation in asynchronous computer-mediated communication environment.

  4. Model of Intercultural Communicative Competence

    Institute of Scientific and Technical Information of China (English)

    刘星

    2015-01-01

    Intercultural communication is regarded as both an important course in Chinese universities but also a necessary skill which global citizens must own.How to define the term of intercultural communicative competence becomes vital in developing and assessing learners’ intercultural competence.

  5. Model of Intercultural Communicative Competence

    Institute of Scientific and Technical Information of China (English)

    刘星

    2015-01-01

    ntercultural communication is regarded as both an important course in Chinese universities but also a necessary skill which global citizens must own.How to define the term of intercultural communicative competence becomes vital in developing and assessing learners’ intercultural competence.

  6. Overlapping Communication and Computation with OpenMP and MPI

    Directory of Open Access Journals (Sweden)

    Timothy H. Kaiser

    2001-01-01

    Full Text Available Machines comprised of a distributed collection of shared memory or SMP nodes are becoming common for parallel computing. OpenMP can be combined with MPI on many such machines. Motivations for combing OpenMP and MPI are discussed. While OpenMP is typically used for exploiting loop-level parallelism it can also be used to enable coarse grain parallelism, potentially leading to less overhead. We show how coarse grain OpenMP parallelism can also be used to facilitate overlapping MPI communication and computation for stencil-based grid programs such as a program performing Gauss-Seidel iteration with red-black ordering. Spatial subdivision or domain decomposition is used to assign a portion of the grid to each thread. One thread is assigned a null calculation region so it was free to perform communication. Example calculations were run on an IBM SP using both the Kuck & Associates and IBM compilers.

  7. A Light-Weight Communication Library for Distributed Computing

    CERN Document Server

    Groen, Derek; Grosso, Paola; de Laat, Cees; Zwart, Simon Portegies; 10.1088/1749-4699/3/1/015002

    2010-01-01

    We present MPWide, a platform independent communication library for performing message passing between computers. Our library allows coupling of several local MPI applications through a long distance network and is specifically optimized for such communications. The implementation is deliberately kept light-weight, platform independent and the library can be installed and used without administrative privileges. The only requirements are a C++ compiler and at least one open port to a wide area network on each site. In this paper we present the library, describe the user interface, present performance tests and apply MPWide in a large scale cosmological N-body simulation on a network of two computers, one in Amsterdam and the other in Tokyo.

  8. Optimal collective communication algorithms in grid computing system

    Institute of Scientific and Technical Information of China (English)

    Wu Yanhui; Lu Xinda

    2005-01-01

    With computational grid, running parallel program on large-scale and geographically distributed computer systems is feasible. It is a difficult task to write parallel applications which may require changing the communication structure of the applications. MPI's collective operations allow for some of these changes to be hidden from the applications programmer. We have developed optimal collective communication algorithms optimized for wide area systems and have taken hierarchical network structure into account. Both the bandwidth and the latency of the LAN and WAN links differ by almost two orders of magnitude. Our algorithms are designed to send the minimal amount of data over the slow wide area links, and to only incur a single wide area latency. Compared to MPICH that do not consider the topology, large performance improvements are possible.

  9. High performance computing and communications: FY 1997 implementation plan

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-12-01

    The High Performance Computing and Communications (HPCC) Program was formally authorized by passage, with bipartisan support, of the High-Performance Computing Act of 1991, signed on December 9, 1991. The original Program, in which eight Federal agencies participated, has now grown to twelve agencies. This Plan provides a detailed description of the agencies` FY 1996 HPCC accomplishments and FY 1997 HPCC plans. Section 3 of this Plan provides an overview of the HPCC Program. Section 4 contains more detailed definitions of the Program Component Areas, with an emphasis on the overall directions and milestones planned for each PCA. Appendix A provides a detailed look at HPCC Program activities within each agency.

  10. Secure Two-Party Computation with Low Communication

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Kölker, Jonas; Faust, Sebastian

    2012-01-01

    We propose a 2-party UC-secure protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the circuit description of the function, and the workload for one of the parties is also only poly-logarithmic in the size...... of the circuit. This implies, for instance, delegatable computation that requires no expensive off-line phase and remains secure even if the server learns whether the client accepts its results. To achieve this, we define two new notions of extractable hash functions, propose an instantiation based...

  11. Computational modelling flow and transport

    NARCIS (Netherlands)

    Stelling, G.S.; Booij, N.

    1999-01-01

    Lecture notes CT wa4340. Derivation of equations using balance principles; numerical treatment of ordinary differential equations; time dependent partial differential equations; the strucure of a computer model:DUFLO; usage of numerical models.

  12. JPRS Report, Science & Technology, Europe, First International Computers Communications Conference

    Science.gov (United States)

    2007-11-02

    Hong Kong Telephone has employed fibre optic technology in its transmission network since 1981. Fibre optic transmission systems are used to...leased datalines. The potentials of fibre optic systems are large, and in this paper, some examples will be given to illustrate how the attributes of... fibre optic systems are exploited in Hong Kong Telephone. This report of Science & Technology Europe, First International Computers Communications Conference.

  13. Radio Synthesis Imaging - A High Performance Computing and Communications Project

    Science.gov (United States)

    Crutcher, Richard M.

    The National Science Foundation has funded a five-year High Performance Computing and Communications project at the National Center for Supercomputing Applications (NCSA) for the direct implementation of several of the computing recommendations of the Astronomy and Astrophysics Survey Committee (the "Bahcall report"). This paper is a summary of the project goals and a progress report. The project will implement a prototype of the next generation of astronomical telescope systems - remotely located telescopes connected by high-speed networks to very high performance, scalable architecture computers and on-line data archives, which are accessed by astronomers over Gbit/sec networks. Specifically, a data link has been installed between the BIMA millimeter-wave synthesis array at Hat Creek, California and NCSA at Urbana, Illinois for real-time transmission of data to NCSA. Data are automatically archived, and may be browsed and retrieved by astronomers using the NCSA Mosaic software. In addition, an on-line digital library of processed images will be established. BIMA data will be processed on a very high performance distributed computing system, with I/O, user interface, and most of the software system running on the NCSA Convex C3880 supercomputer or Silicon Graphics Onyx workstations connected by HiPPI to the high performance, massively parallel Thinking Machines Corporation CM-5. The very computationally intensive algorithms for calibration and imaging of radio synthesis array observations will be optimized for the CM-5 and new algorithms which utilize the massively parallel architecture will be developed. Code running simultaneously on the distributed computers will communicate using the Data Transport Mechanism developed by NCSA. The project will also use the BLANCA Gbit/s testbed network between Urbana and Madison, Wisconsin to connect an Onyx workstation in the University of Wisconsin Astronomy Department to the NCSA CM-5, for development of long

  14. Mathematical Modeling and Computational Thinking

    Science.gov (United States)

    Sanford, John F.; Naidu, Jaideep T.

    2017-01-01

    The paper argues that mathematical modeling is the essence of computational thinking. Learning a computer language is a valuable assistance in learning logical thinking but of less assistance when learning problem-solving skills. The paper is third in a series and presents some examples of mathematical modeling using spreadsheets at an advanced…

  15. 78 FR 24775 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Science.gov (United States)

    2013-04-26

    ... COMMISSION Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and... United States after importation of certain wireless communication devices, portable music and data processing devices, computers and components thereof by reason of ] infringement of certain claims of...

  16. Computation models of discourse

    Energy Technology Data Exchange (ETDEWEB)

    Brady, M.; Berwick, R.C.

    1983-01-01

    This book presents papers on artificial intelligence and natural language. Topics considered include recognizing intentions from natural language utterances, cooperative responses from a portable natural language database query system, natural language generation as a computational problem, focusing in the comprehension of definite anaphora, and factors in forming discourse-dependent descriptions.

  17. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of digital computer and communication systems... computer and communication systems and networks. By November 23, 2009 each licensee currently licensed to... provide high assurance that digital computer and communication systems and networks are...

  18. 76 FR 41523 - In the Matter of Certain Mobile Communications and Computer Devices and Components Thereof...

    Science.gov (United States)

    2011-07-14

    ... COMMISSION In the Matter of Certain Mobile Communications and Computer Devices and Components Thereof; Notice...-TA-704, Certain Mobile Communications and Computer Devices and Components Thereof based on a... communications and computer devices and components thereof by reason of infringement of certain claims of...

  19. Computer-Aided Modeling Framework

    DEFF Research Database (Denmark)

    Fedorova, Marina; Sin, Gürkan; Gani, Rafiqul

    with them. As the required models may be complex and require multiple time and/or length scales, their development and application for product-process design is not trivial. Therefore, a systematic modeling framework can contribute by significantly reducing the time and resources needed for model...... development and application. The proposed work is a part of the project for development of methods and tools that will allow systematic generation, analysis and solution of models for various objectives. It will use the computer-aided modeling framework that is based on a modeling methodology, which combines....... In this contribution, the concept of template-based modeling is presented and application is highlighted for the specific case of catalytic membrane fixed bed models. The modeling template is integrated in a generic computer-aided modeling framework. Furthermore, modeling templates enable the idea of model reuse...

  20. An Exploratory Analysis of Computer Mediated Communications on Cyberstalking Severity

    Directory of Open Access Journals (Sweden)

    Stephen D. Barnes

    2007-09-01

    Full Text Available The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain.  Bargh (2002 suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities.  This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC and stalking, which is a common form of disjunctive relationships.  Field data from cyberstalking cases will be used to look at the effects of CMC channels on stalking case severity, and exploring the relative impacts of CMC channel characteristics on such cases.  To accomplish this, a ratio scaled measure of stalking case severity is proposed for use in exploring the relationship between case severity and CMC media characteristics, anonymity, and the prior relationship between the stalker and the victim.  Expected results are identified, and follow-up research is proposed. 

  1. Computational models of syntactic acquisition.

    Science.gov (United States)

    Yang, Charles

    2012-03-01

    The computational approach to syntactic acquisition can be fruitfully pursued by integrating results and perspectives from computer science, linguistics, and developmental psychology. In this article, we first review some key results in computational learning theory and their implications for language acquisition. We then turn to examine specific learning models, some of which exploit distributional information in the input while others rely on a constrained space of hypotheses, yet both approaches share a common set of characteristics to overcome the learning problem. We conclude with a discussion of how computational models connects with the empirical study of child grammar, making the case for computationally tractable, psychologically plausible and developmentally realistic models of acquisition. WIREs Cogn Sci 2012, 3:205-213. doi: 10.1002/wcs.1154 For further resources related to this article, please visit the WIREs website.

  2. LIVING LONG-DISTANCE RELATIONSHIPS THROUGH COMPUTER-MEDIATED COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Almond Pilar N. Aguila

    2009-12-01

    Full Text Available Overseas Filipino Workers (OFWs and their loved ones in thePhilippines manage to have dynamic relationships despite physical distance with Computer-Mediated Communication (CMC or the use of new media (the Internet and cellular phone. Theoretically guided by Marshall McLuhan and Stuart Hall, this paper presents three case studies that depict how individuals mindfully use communication technology to enact their relationships. Such interactions also entail the exchange of new ideas on gender roles, family relations, and dominant-subordinate roles that lead to cultural change. Conclusively, technology has made it easier for OFWs and their loved ones to overcome their aversion to being in long-distance relationships and overseas employment.

  3. Communication efficient basic linear algebra computations on hypercube architectures

    Energy Technology Data Exchange (ETDEWEB)

    Johnsson, S.L.

    1987-04-01

    This paper presents a few algorithms for embedding loops and multidimensional arrays in hypercubes with emphasis on proximity preserving embeddings. A proximity preserving embedding minimizes the need for communication bandwidth in computations requiring nearest neighbor communication. Two storage schemes for ''large'' problems on ''small'' machines are suggested and analyzed, and algorithms for matrix transpose, multiplying matrices, factoring matrices, and solving triangular linear systems are presented. A few complete binary tree embeddings are described and analyzed. The data movement in the matrix algorithms is analyzed and it is shown that in the majority of cases the directed routing paths intersect only at nodes of the hypercube allowing for a maximum degree of pipelining.

  4. Combining Natural Human-Computer Interaction and Wireless Communication

    Directory of Open Access Journals (Sweden)

    Ştefan Gheorghe PENTIUC

    2011-01-01

    Full Text Available In this paper we present how human-computer interaction can be improved by using wireless communication between devices. Devices that offer a natural user interaction, like the Microsoft Surface Table and tablet PCs, can work together to enhance the experience of an application. Users can use physical objects for a more natural way of handling the virtual world on one hand, and interact with other users wirelessly connected on the other. Physical objects, that interact with the surface table, have a tag attached to them, allowing us to identify them, and take the required action. The TCP/IP protocol was used to handle the wireless communication over the wireless network. A server and a client application were developed for the used devices. To get a wide range of targeted mobile devices, different frameworks for developing cross platform applications were analyzed.

  5. High performance computing and communications: FY 1995 implementation plan

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1994-04-01

    The High Performance Computing and Communications (HPCC) Program was formally established following passage of the High Performance Computing Act of 1991 signed on December 9, 1991. Ten federal agencies in collaboration with scientists and managers from US industry, universities, and laboratories have developed the HPCC Program to meet the challenges of advancing computing and associated communications technologies and practices. This plan provides a detailed description of the agencies` HPCC implementation plans for FY 1994 and FY 1995. This Implementation Plan contains three additional sections. Section 3 provides an overview of the HPCC Program definition and organization. Section 4 contains a breakdown of the five major components of the HPCC Program, with an emphasis on the overall directions and milestones planned for each one. Section 5 provides a detailed look at HPCC Program activities within each agency. Although the Department of Education is an official HPCC agency, its current funding and reporting of crosscut activities goes through the Committee on Education and Health Resources, not the HPCC Program. For this reason the Implementation Plan covers nine HPCC agencies.

  6. Computational modelling of evolution: ecosystems and language

    CERN Document Server

    Lipowski, Adam

    2008-01-01

    Recently, computational modelling became a very important research tool that enables us to study problems that for decades evaded scientific analysis. Evolutionary systems are certainly examples of such problems: they are composed of many units that might reproduce, diffuse, mutate, die, or in some cases for example communicate. These processes might be of some adaptive value, they influence each other and occur on various time scales. That is why such systems are so difficult to study. In this paper we briefly review some computational approaches, as well as our contributions, to the evolution of ecosystems and language. We start from Lotka-Volterra equations and the modelling of simple two-species prey-predator systems. Such systems are canonical example for studying oscillatory behaviour in competitive populations. Then we describe various approaches to study long-term evolution of multi-species ecosystems. We emphasize the need to use models that take into account both ecological and evolutionary processe...

  7. Low latency, high bandwidth data communications between compute nodes in a parallel computer

    Science.gov (United States)

    Archer, Charles J.; Blocksome, Michael A.; Ratterman, Joseph D.; Smith, Brian E.

    2010-11-02

    Methods, parallel computers, and computer program products are disclosed for low latency, high bandwidth data communications between compute nodes in a parallel computer. Embodiments include receiving, by an origin direct memory access (`DMA`) engine of an origin compute node, data for transfer to a target compute node; sending, by the origin DMA engine of the origin compute node to a target DMA engine on the target compute node, a request to send (`RTS`) message; transferring, by the origin DMA engine, a predetermined portion of the data to the target compute node using memory FIFO operation; determining, by the origin DMA engine whether an acknowledgement of the RTS message has been received from the target DMA engine; if the an acknowledgement of the RTS message has not been received, transferring, by the origin DMA engine, another predetermined portion of the data to the target compute node using a memory FIFO operation; and if the acknowledgement of the RTS message has been received by the origin DMA engine, transferring, by the origin DMA engine, any remaining portion of the data to the target compute node using a direct put operation.

  8. toolkit computational mesh conceptual model.

    Energy Technology Data Exchange (ETDEWEB)

    Baur, David G.; Edwards, Harold Carter; Cochran, William K.; Williams, Alan B.; Sjaardema, Gregory D.

    2010-03-01

    The Sierra Toolkit computational mesh is a software library intended to support massively parallel multi-physics computations on dynamically changing unstructured meshes. This domain of intended use is inherently complex due to distributed memory parallelism, parallel scalability, heterogeneity of physics, heterogeneous discretization of an unstructured mesh, and runtime adaptation of the mesh. Management of this inherent complexity begins with a conceptual analysis and modeling of this domain of intended use; i.e., development of a domain model. The Sierra Toolkit computational mesh software library is designed and implemented based upon this domain model. Software developers using, maintaining, or extending the Sierra Toolkit computational mesh library must be familiar with the concepts/domain model presented in this report.

  9. Integrating language models into classifiers for BCI communication: a review

    Science.gov (United States)

    Speier, W.; Arnold, C.; Pouratian, N.

    2016-06-01

    Objective. The present review systematically examines the integration of language models to improve classifier performance in brain-computer interface (BCI) communication systems. Approach. The domain of natural language has been studied extensively in linguistics and has been used in the natural language processing field in applications including information extraction, machine translation, and speech recognition. While these methods have been used for years in traditional augmentative and assistive communication devices, information about the output domain has largely been ignored in BCI communication systems. Over the last few years, BCI communication systems have started to leverage this information through the inclusion of language models. Main results. Although this movement began only recently, studies have already shown the potential of language integration in BCI communication and it has become a growing field in BCI research. BCI communication systems using language models in their classifiers have progressed down several parallel paths, including: word completion; signal classification; integration of process models; dynamic stopping; unsupervised learning; error correction; and evaluation. Significance. Each of these methods have shown significant progress, but have largely been addressed separately. Combining these methods could use the full potential of language model, yielding further performance improvements. This integration should be a priority as the field works to create a BCI system that meets the needs of the amyotrophic lateral sclerosis population.

  10. COMMUNICATION STRATEGY ABOUT BUSINESS MODELS: STAKEHOLDERS PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Bojoagă Alexandru

    2013-07-01

    Full Text Available Organizations inform stakeholders about their current and future activities, processes, created value, strategic intentions, and other information that may influence the established relationships. Organizations choose to communicate with stakeholders by different means and in varied ways. The annual report represents a way of communicating between companies and their stakeholders, and it is offering comprehensive information about how companies operates and creates value. The business model is an emerging concept in management literature and practice. The concept describes the logic by which a organization creates, maintains and delivers value for its stakeholders. Through annual reports organisations can communicate to stakeholders information about their business models.We investigated how information about business models is explicitly communicated through annual reports, and how this information is reffering to stakeholders. Our paper aims to reveal which stakeholders are more often mentioned when organizations are communicating about business models through annual reports. This approach shows the attention degree given by organizations to stakeholders. We perceived this from a strategic point of view, as a strategic signal. Thus, we considered if the stakeholder is mentioned more frequent in the communicated message it has a greater role in communication strategy about business model. We conducted an exploratory research and have realized a content analysis.The analysed data consist in over a thousand annual reports from 96 organizations. We analysed the informations transmitted by organizations through annual reports. The annual reports were for a time period of 12 years. Most of the selected companies are multi-business, and are operating in different industries. The results show the stakeholder’s hierarchy based on how often they were mentioned in the communicated messages about business models through annual reports. Based on our

  11. A Relational Scaffolding Model of Hybrid Communication

    Science.gov (United States)

    Meissner, Jens O.; Tuckermann, Harald

    Two fundamental trends with important implications for today's management of organizations build the impetus for this paper. The first is the ubiquity of computer-mediated communication (CMC). The second is the revived interest for social relations and social networks at the workplace and its focus on relational processes in organizations.

  12. Soft Computing in Information Communication Technology Volume 2

    CERN Document Server

    2012-01-01

    This book is a collection of the accepted papers concerning soft computing in information communication technology. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Fuzzy Logic, Machine Learning, Cryptography, Pattern Recognition, Bioinformatics, Biomedical Engineering, Advancements in ICT.

  13. Human Communication--A New Model.

    Science.gov (United States)

    McLeish, John

    1978-01-01

    Pavlov's organism-in-the-environment model was adapted to a functional analysis of communication, expecially abstract and symbolic activities. A classification of discrimination response and reinforcement patterns was given. (CP)

  14. Patient-Specific Computational Modeling

    CERN Document Server

    Peña, Estefanía

    2012-01-01

    This book addresses patient-specific modeling. It integrates computational modeling, experimental procedures, imagine clinical segmentation and mesh generation with the finite element method (FEM) to solve problems in computational biomedicine and bioengineering. Specific areas of interest include cardiovascular problems, ocular and muscular systems and soft tissue modeling. Patient-specific modeling has been the subject of serious research over the last seven years and interest in the area is continually growing and this area is expected to further develop in the near future.

  15. Trust Models in Ubiquitous Computing

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl; Sassone, Vladimiro

    2008-01-01

    We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.......We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models....

  16. Conceptual model of communications in public health

    Directory of Open Access Journals (Sweden)

    Марія Андріївна Знаменська

    2015-07-01

    Full Text Available Actuality. The role of communications in effective reform of public health in the country is discovered in scientific literature last time. But there are no works that fully present the system of communications in public health; this fact defined actuality of the given research.Methods. The next scientific methods are used in this work: structural and logical analysis, conceptual modeling. The systematic approach became a base of research. Results. There was elaborated conceptual model of the system of communications in public health its node idea is a consistent solution of the priority problem of supply the population of the country in whole and the separate task groups of communicative impact with complex objective information in the system of public health. At constructing of the model there were separated the next groups of problems: structural construction of the system of communication; supply of the system with resources; methods and means of communication; monitoring and assessment of efficiency of communication.Conclusions. The use of this model allows at optimal costs to eliminate the organizational and administrative defects and increase an awareness of the people in organization of public health, in maintenance and improvement of personal health. 

  17. International Conference on Soft Computing in Information Communication Technology

    CERN Document Server

    Soft Computing in Information Communication Technology

    2012-01-01

      This is a collection of the accepted papers concerning soft computing in information communication technology. All accepted papers are subjected to strict peer-reviewing by 2 expert referees. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Neural Networks, Swarm Intelligence, Evolutionary Computing, Image Processing Internet Security, Data Security, Data Mining, Network Security and Protection of data and Cyber laws. Our sincere appreciation and thanks go to these authors for their contributions to this conference. I hope you can gain lots of useful information from the book.

  18. An Analytical Study of Computation and Communication Tradeoffs in Distributed Graph

    Directory of Open Access Journals (Sweden)

    Amirreza Abdolrashidi

    2015-12-01

    Full Text Available Distributed vertex-centric graph processing systems such as Pregel, Giraph and GPS have acquired significant popularity in recent years. Although the manner in which graph data is partitioned and placed on the computational nodes has considerable impact on the performance of the vertex-centric graph processing cluster, there are very few comprehensive studies on this topic. Towards enhancing our understanding of this important factor, in this paper, we propose a novel model for analyzing the performance of such clusters. Using three graph algorithms as case studies, we also characterize the inherent tradeoff between the computational load distribution and the communication overheads of a BSP cluster. This paper also reports a detailed experimental study investigating the performance of commonly-used graph partitioning mechanisms with respect to their computational load distribution characteristics and the associated communication overheads.

  19. Integrated Computational Model Development

    Science.gov (United States)

    2014-03-01

    68.5%, 9.6% and 21.9%, respectively. The alloy density and Vickers microhardness were ρ = 8.23 ± 0.01 g/cm3 and Hv = 5288 ± 1 MPa. [3...and 3-D. Techniques to mechanically test materials at smaller scales were developed to better inform the deformation models. Also methods were...situ microscale tension testing technique was adapted to enable microscale fatigue testing on tensile dog-bone specimens. Microscale tensile fatigue

  20. Connections that Count: Brain-Computer Interface Enables the Profoundly Paralyzed to Communicate

    Science.gov (United States)

    ... Current Issue Past Issues Connections that Count: Brain-Computer Interface Enables the Profoundly Paralyzed to Communicate Past ... this page please turn Javascript on. A brain-computer interface (BCI) system This brain-computer interface (BCI) ...

  1. Performance Evaluation of Communication Software Systems for Distributed Computing

    Science.gov (United States)

    Fatoohi, Rod

    1996-01-01

    In recent years there has been an increasing interest in object-oriented distributed computing since it is better quipped to deal with complex systems while providing extensibility, maintainability, and reusability. At the same time, several new high-speed network technologies have emerged for local and wide area networks. However, the performance of networking software is not improving as fast as the networking hardware and the workstation microprocessors. This paper gives an overview and evaluates the performance of the Common Object Request Broker Architecture (CORBA) standard in a distributed computing environment at NASA Ames Research Center. The environment consists of two testbeds of SGI workstations connected by four networks: Ethernet, FDDI, HiPPI, and ATM. The performance results for three communication software systems are presented, analyzed and compared. These systems are: BSD socket programming interface, IONA's Orbix, an implementation of the CORBA specification, and the PVM message passing library. The results show that high-level communication interfaces, such as CORBA and PVM, can achieve reasonable performance under certain conditions.

  2. Component Breakout Computer Model

    Science.gov (United States)

    1987-04-29

    Weapon Systems: A Policy Analysis." The Rand Graduate Institute. November 1983. Boger . D. "Statistical Models for Estimating Overhead Costs." M. S...SQUARE SCREEN PROGRAM BO DLS 70 LOCATE 3,5 100 PRINT " I I I I I I I I I I I I I I t I I I t I I i iiitiii I I I I i t I i 110 LOCATE 4,5 I 20...GOTO 4620 4610 REM ***********«««*«««**#«***********#******»,*###!^5|[^,„<c#,5|c„ dl -r C^M EED SUPPORT .c.50 REM A6(6)...N0 OF EMPLOYEES 4660 IF

  3. TCP-IP Model in Data Communication and Networking

    Directory of Open Access Journals (Sweden)

    Pranab Bandhu Nath

    2015-10-01

    Full Text Available The Internet protocol suite is the computer networking model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP/IP, because it’s most important protocols, the Transmission Control Protocol (TCP and the Internet Protocol (IP, were the first networking protocols defined in this standard. Often also called the Internet model, it was originally also known as the DoD model, because the development of the networking model was funded by DARPA, an agency of the United States Department of Defense. TCP/IP provides end-to-end connectivity specifying how data should be packetized, addressed, transmitted, routed and received at the destination. This functionality is organized into four abstraction layers which are used to sort all related protocols according to the scope of networking involved. From lowest to highest, the layers are the link layer, containing communication technologies for a single network segment (link; the internet layer, connecting hosts across independent networks, thus establishing internetworking; the transport layer handling host-to-host communication; and the application layer, which provides process-to-process application data exchange. Our aim is describe operation & models of TCP-IP suite in data communication networking

  4. Efficient Computational Model of Hysteresis

    Science.gov (United States)

    Shields, Joel

    2005-01-01

    A recently developed mathematical model of the output (displacement) versus the input (applied voltage) of a piezoelectric transducer accounts for hysteresis. For the sake of computational speed, the model is kept simple by neglecting the dynamic behavior of the transducer. Hence, the model applies to static and quasistatic displacements only. A piezoelectric transducer of the type to which the model applies is used as an actuator in a computer-based control system to effect fine position adjustments. Because the response time of the rest of such a system is usually much greater than that of a piezoelectric transducer, the model remains an acceptably close approximation for the purpose of control computations, even though the dynamics are neglected. The model (see Figure 1) represents an electrically parallel, mechanically series combination of backlash elements, each having a unique deadband width and output gain. The zeroth element in the parallel combination has zero deadband width and, hence, represents a linear component of the input/output relationship. The other elements, which have nonzero deadband widths, are used to model the nonlinear components of the hysteresis loop. The deadband widths and output gains of the elements are computed from experimental displacement-versus-voltage data. The hysteresis curve calculated by use of this model is piecewise linear beyond deadband limits.

  5. Effects of Training on Computer-Mediated Communication in Single or Mixed Gender Small Task Groups.

    Science.gov (United States)

    Savicki, Victor; Kelley, Merle; Ammon, Benjamin

    2002-01-01

    Investigates group gender composition and communication styles in small task groups involved in computer-mediated communication. Describes a study that tried to train small task groups in the use of one communication style and suggests further research in the area of communication training for online task groups. (Author/LRW)

  6. Gender and Computer-Mediated Communication: Group Processes in Problem Solving.

    Science.gov (United States)

    Adrianson, L.

    2001-01-01

    Reports results from a study of university students in Sweden that investigated aspects of communicative processes using face-to-face and computer-mediated communication. Examined influences of gender on communication equality, social relations, and communicative processes and studied differences in self-awareness. Results showed few significant…

  7. The role of emotion in computer-mediated communication: A review

    NARCIS (Netherlands)

    Derks, D.; Fischer, A.H.; Bos, A.E.R.

    2008-01-01

    It has been argued that the communication of emotions is more difficult in computer-mediated communication (CMC) than in face-to-face (F2F) communication. The aim of this paper is to review the empirical evidence in order to gain insight in whether emotions are communicated differently in these diff

  8. Computer Modelling of Dynamic Processes

    Directory of Open Access Journals (Sweden)

    B. Rybakin

    2000-10-01

    Full Text Available Results of numerical modeling of dynamic problems are summed in the article up. These problems are characteristic for various areas of human activity, in particular for problem solving in ecology. The following problems are considered in the present work: computer modeling of dynamic effects on elastic-plastic bodies, calculation and determination of performances of gas streams in gas cleaning equipment, modeling of biogas formation processes.

  9. Computational models of complex systems

    CERN Document Server

    Dabbaghian, Vahid

    2014-01-01

    Computational and mathematical models provide us with the opportunities to investigate the complexities of real world problems. They allow us to apply our best analytical methods to define problems in a clearly mathematical manner and exhaustively test our solutions before committing expensive resources. This is made possible by assuming parameter(s) in a bounded environment, allowing for controllable experimentation, not always possible in live scenarios. For example, simulation of computational models allows the testing of theories in a manner that is both fundamentally deductive and experimental in nature. The main ingredients for such research ideas come from multiple disciplines and the importance of interdisciplinary research is well recognized by the scientific community. This book provides a window to the novel endeavours of the research communities to present their works by highlighting the value of computational modelling as a research tool when investigating complex systems. We hope that the reader...

  10. Computational models of adult neurogenesis

    Science.gov (United States)

    Cecchi, Guillermo A.; Magnasco, Marcelo O.

    2005-10-01

    Experimental results in recent years have shown that adult neurogenesis is a significant phenomenon in the mammalian brain. Little is known, however, about the functional role played by the generation and destruction of neurons in the context of an adult brain. Here, we propose two models where new projection neurons are incorporated. We show that in both models, using incorporation and removal of neurons as a computational tool, it is possible to achieve a higher computational efficiency that in purely static, synapse-learning-driven networks. We also discuss the implication for understanding the role of adult neurogenesis in specific brain areas like the olfactory bulb and the dentate gyrus.

  11. Computational Modeling of Simulation Tests.

    Science.gov (United States)

    1980-06-01

    Mexico , March 1979. 14. Kinney, G. F.,.::. IeiN, .hoce 1h Ir, McMillan, p. 57, 1962. 15. Courant and Friedrichs, ,U: r. on moca an.: Jho...AD 79 275 NEW MEXICO UNIV ALBUGUERGUE ERIC H WANG CIVIL ENGINE-ETC F/6 18/3 COMPUTATIONAL MODELING OF SIMULATION TESTS.(U) JUN 80 6 LEIGH, W CHOWN, B...COMPUTATIONAL MODELING OF SIMULATION TESTS00 0G. Leigh W. Chown B. Harrison Eric H. Wang Civil Engineering Research Facility University of New Mexico

  12. 75 FR 8399 - In the Matter of Certain Mobile Communications and Computer Devices and Components Thereof...

    Science.gov (United States)

    2010-02-24

    ... COMMISSION In the Matter of Certain Mobile Communications and Computer Devices and Components Thereof; Notice... after importation of certain mobile communications or computer devices or components thereof that... U.S.C. 1337, on behalf of Apple Inc., f/k/a Apple Computer, Inc. of Cupertino, California....

  13. Climate Modeling Computing Needs Assessment

    Science.gov (United States)

    Petraska, K. E.; McCabe, J. D.

    2011-12-01

    This paper discusses early findings of an assessment of computing needs for NASA science, engineering and flight communities. The purpose of this assessment is to document a comprehensive set of computing needs that will allow us to better evaluate whether our computing assets are adequately structured to meet evolving demand. The early results are interesting, already pointing out improvements we can make today to get more out of the computing capacity we have, as well as potential game changing innovations for the future in how we apply information technology to science computing. Our objective is to learn how to leverage our resources in the best way possible to do more science for less money. Our approach in this assessment is threefold: Development of use case studies for science workflows; Creating a taxonomy and structure for describing science computing requirements; and characterizing agency computing, analysis, and visualization resources. As projects evolve, science data sets increase in a number of ways: in size, scope, timelines, complexity, and fidelity. Generating, processing, moving, and analyzing these data sets places distinct and discernable requirements on underlying computing, analysis, storage, and visualization systems. The initial focus group for this assessment is the Earth Science modeling community within NASA's Science Mission Directorate (SMD). As the assessment evolves, this focus will expand to other science communities across the agency. We will discuss our use cases, our framework for requirements and our characterizations, as well as our interview process, what we learned and how we plan to improve our materials after using them in the first round of interviews in the Earth Science Modeling community. We will describe our plans for how to expand this assessment, first into the Earth Science data analysis and remote sensing communities, and then throughout the full community of science, engineering and flight at NASA.

  14. A system dynamics model for communications networks

    Science.gov (United States)

    Awcock, A. J.; King, T. E. G.

    1985-09-01

    An abstract model of a communications network in system dynamics terminology is developed as implementation of this model by a FORTRAN program package developed at RSRE is discussed. The result of this work is a high-level simulation package in which the performance of adaptive routing algorithms and other network controls may be assessed for a network of arbitrary topology.

  15. Performance Modeling of Communication Networks with Markov Chains

    CERN Document Server

    Mo, Jeonghoon

    2010-01-01

    This book is an introduction to Markov chain modeling with applications to communication networks. It begins with a general introduction to performance modeling in Chapter 1 where we introduce different performance models. We then introduce basic ideas of Markov chain modeling: Markov property, discrete time Markov chain (DTMe and continuous time Markov chain (CTMe. We also discuss how to find the steady state distributions from these Markov chains and how they can be used to compute the system performance metric. The solution methodologies include a balance equation technique, limiting probab

  16. An Emotional Agent Model Based on Granular Computing

    Directory of Open Access Journals (Sweden)

    Jun Hu

    2012-01-01

    Full Text Available Affective computing has a very important significance for fulfilling intelligent information processing and harmonious communication between human being and computers. A new model for emotional agent is proposed in this paper to make agent have the ability of handling emotions, based on the granular computing theory and the traditional BDI agent model. Firstly, a new emotion knowledge base based on granular computing for emotion expression is presented in the model. Secondly, a new emotional reasoning algorithm based on granular computing is proposed. Thirdly, a new emotional agent model based on granular computing is presented. Finally, based on the model, an emotional agent for patient assistant in hospital is realized, experiment results show that it is efficient to handle simple emotions.

  17. Linguistics, Computers, and the Language Teacher. A Communicative Approach.

    Science.gov (United States)

    Underwood, John H.

    This analysis of the state of the art of computer programs and programming for language teaching has two parts. In the first part, an overview of the theory and practice of language teaching, Noam Chomsky's view of language, and the implications and problems of generative theory are presented. The theory behind the input model of language…

  18. Linguistics, Computers, and the Language Teacher. A Communicative Approach.

    Science.gov (United States)

    Underwood, John H.

    This analysis of the state of the art of computer programs and programming for language teaching has two parts. In the first part, an overview of the theory and practice of language teaching, Noam Chomsky's view of language, and the implications and problems of generative theory are presented. The theory behind the input model of language…

  19. A Multi-Agent Immunology Model for Security Computer

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper presents a computer immunology model for computersecurity , whose main components are defined as idea of Multi-Agent. It introduces the n at ural immune system on the principle, discusses the idea and characteristics of Mu lti-Agent. It gives a system model, and describes the structure and function of each agent. Also, the communication method between agents is described.

  20. [Forensic evidence-based medicine in computer communication networks].

    Science.gov (United States)

    Qiu, Yun-Liang; Peng, Ming-Qi

    2013-12-01

    As an important component of judicial expertise, forensic science is broad and highly specialized. With development of network technology, increasement of information resources, and improvement of people's legal consciousness, forensic scientists encounter many new problems, and have been required to meet higher evidentiary standards in litigation. In view of this, evidence-based concept should be established in forensic medicine. We should find the most suitable method in forensic science field and other related area to solve specific problems in the evidence-based mode. Evidence-based practice can solve the problems in legal medical field, and it will play a great role in promoting the progress and development of forensic science. This article reviews the basic theory of evidence-based medicine and its effect, way, method, and evaluation in the forensic medicine in order to discuss the application value of forensic evidence-based medicine in computer communication networks.

  1. Test experience on an ultrareliable computer communication network

    Science.gov (United States)

    Abbott, L. W.

    1984-01-01

    The dispersed sensor processing mesh (DSPM) is an experimental, ultra-reliable, fault-tolerant computer communications network that exhibits an organic-like ability to regenerate itself after suffering damage. The regeneration is accomplished by two routines - grow and repair. This paper discusses the DSPM concept for achieving fault tolerance and provides a brief description of the mechanization of both the experiment and the six-node experimental network. The main topic of this paper is the system performance of the growth algorithm contained in the grow routine. The characteristics imbued to DSPM by the growth algorithm are also discussed. Data from an experimental DSPM network and software simulation of larger DSPM-type networks are used to examine the inherent limitation on growth time by the growth algorithm and the relationship of growth time to network size and topology.

  2. Metrics and the effective computational scientist: process, quality and communication.

    Science.gov (United States)

    Baldwin, Eric T

    2012-09-01

    Recent treatments of computational knowledge worker productivity have focused upon the value the discipline brings to drug discovery using positive anecdotes. While this big picture approach provides important validation of the contributions of these knowledge workers, the impact accounts do not provide the granular detail that can help individuals and teams perform better. I suggest balancing the impact-focus with quantitative measures that can inform the development of scientists. Measuring the quality of work, analyzing and improving processes, and the critical evaluation of communication can provide immediate performance feedback. The introduction of quantitative measures can complement the longer term reporting of impacts on drug discovery. These metric data can document effectiveness trends and can provide a stronger foundation for the impact dialogue.

  3. First International Conference Multimedia Processing, Communication and Computing Applications

    CERN Document Server

    Guru, Devanur

    2013-01-01

    ICMCCA 2012 is the first International Conference on Multimedia Processing, Communication and Computing Applications and the theme of the Conference is chosen as ‘Multimedia Processing and its Applications’. Multimedia processing has been an active research area contributing in many frontiers of today’s science and technology. This book presents peer-reviewed quality papers on multimedia processing, which covers a very broad area of science and technology. The prime objective of the book is to familiarize readers with the latest scientific developments that are taking place in various fields of multimedia processing and is widely used in many disciplines such as Medical Diagnosis, Digital Forensic, Object Recognition, Image and Video Analysis, Robotics, Military, Automotive Industries, Surveillance and Security, Quality Inspection, etc. The book will assist the research community to get the insight of the overlapping works which are being carried out across the globe at many medical hospitals and instit...

  4. Complex systems relationships between control, communications and computing

    CERN Document Server

    2016-01-01

    This book gives a wide-ranging description of the many facets of complex dynamic networks and systems within an infrastructure provided by integrated control and supervision: envisioning, design, experimental exploration, and implementation. The theoretical contributions and the case studies presented can reach control goals beyond those of stabilization and output regulation or even of adaptive control. Reporting on work of the Control of Complex Systems (COSY) research program, Complex Systems follows from and expands upon an earlier collection: Control of Complex Systems by introducing novel theoretical techniques for hard-to-control networks and systems. The major common feature of all the superficially diverse contributions encompassed by this book is that of spotting and exploiting possible areas of mutual reinforcement between control, computing and communications. These help readers to achieve not only robust stable plant system operation but also properties such as collective adaptivity, integrity an...

  5. Meta-Analysis and Computer-Mediated Communication.

    Science.gov (United States)

    Taylor, Alan M

    2016-04-01

    Because of the use of human participants and differing contextual variables, research in second language acquisition often produces conflicting results, leaving practitioners confused and unsure of the effectiveness of specific treatments. This article provides insight into a recent seminal meta-analysis on the effectiveness of computer-mediated communication, providing further statistical evidence of the importance of its results. The significance of the study is examined by looking at the p values included in the references, to demonstrate how results can easily be misconstrued by practitioners and researchers. Lin's conclusion regarding the research setting of the study reports is also evaluated. In doing so, other possible explanations of what may be influencing the results can be proposed.

  6. Pervasive Computing and Prosopopoietic Modelling

    DEFF Research Database (Denmark)

    Michelsen, Anders Ib

    2011-01-01

    into the other. It also indicates a generative creation that itself points to important issues of ontology with methodological implications for the design of computing. In this article these implications will be conceptualised as prosopopoietic modeling on the basis of Bernward Joerges introduction...... of the classical rhetoric term of ’prosopopoeia’ into the debate on large technological systems. First, the paper introduces the paradoxical distinction/complicity by debating Gilbert Simondon’s notion of a ‘margin of indeterminacy’ vis-a-vis computing. Second, it debates the idea of prosopopoietic modeling......, pointing to a principal role of the paradoxical distinction/complicity within the computational heritage in three cases: a. Prosopopoietic aspects of John von Neumann’s First Draft of a Report on the EDVAC from 1945. b. Herbert Simon’s notion of simulation in The Science of the Artificial from the 1970s. c...

  7. Peplau in cyberspace: an analysis of Peplau's Interpersonal Relations Theory and computer-mediated communication.

    Science.gov (United States)

    Hrabe, David P

    2005-05-01

    This paper explores the applicability of Peplau's Interpersonal Relations Theory to the context of computer-mediated communication. Although Peplau never intended her theory be applied to this mode of communication, research from the fields of communication and social psychology suggest that such application may be possible. After Peplau's theory is briefly summarized, research and theory dealing with computer-mediated communication are explored, and questions for future research endeavors are offered.

  8. Conversational Awareness in Text-Based Computer Mediated Communication

    Science.gov (United States)

    Tran, Minh Hong; Yang, Yun; Raikundalia, Gitesh K.

    Text-based computer-mediated communication (TxtCMC) supports an instant exchange of messages among geographically distributed people. TxtCMC, such as Instant Messaging and chat tools, has increasingly become widespread and popular at home and at work. Supporting conversational awareness is an important aspect of TxtCMC. Conversational awareness provides a user with information about the presence and activity of others, and therefore helps to establish a context for the user’s own activity. Unfortunately, current interface design of TxtCMC provides inadequate support for conversational awareness, especially in support for awareness of turn-taking, conversational context and multiple concurrent conversations. This research aims to address these three issues by (1) conducting an empirical study to identify the user need for conversational awareness and (2) designing an interface to support this type of awareness. This chapter presents two innovative prototypes, namely Relaxed Instant Messenger (RIM) and Conversational Dock (ConDock). RIM integrates a sequential interface with an adaptive threaded interface to support awareness of turn-taking and conversational context. ConDock adopts a focus + context visualisation technique to support awareness of multiple conversations. The evaluations of the two prototypes show that they meet their design objectives and were found useful in enhancing group communication.

  9. Computer Profiling Based Model for Investigation

    Directory of Open Access Journals (Sweden)

    Neeraj Choudhary

    2011-10-01

    Full Text Available Computer profiling is used for computer forensic analysis, and proposes and elaborates on a novel model for use in computer profiling, the computer profiling object model. The computer profiling object model is an information model which models a computer as objects with various attributes and inter-relationships. These together provide the information necessary for a human investigator or an automated reasoning engine to make judgments as to the probable usage and evidentiary value of a computer system. The computer profiling object model can be implemented so as to support automated analysis to provide an investigator with the informationneeded to decide whether manual analysis is required.

  10. Toward a humanistic model in health communication.

    Science.gov (United States)

    Werder, Olaf

    2017-03-01

    Since the key to effective health communication lies in its ability to communicate well, some of its core problems are those that relate to the sharing of meaning between communicators. In elaborating on these problems, this paper offers two key propositions: one, health communication has to pass through the filter of a particular world view that creates a discrepancy between expected and actual message reception and response. Two, the assumption of a rational human actor made implicitly by most health psychological models is a contestable issue, as many times message recipients do not follow a cognitive judgment process. The phenomenon of resisting health messages by reasonable people asks the question whether we ought to rethink our adherence to a particular vision of human health as many times the adverse reaction to behaviour modification occurs as the result of a particular dialogical or discursive situation. At the same time, most motivational decisions in people's daily routines are automatic and use a concept known as self-identity to give stability to their behaviour patterns. Finally, health communication as part of organised government practices adheres to predominant value perspectives within health promotion practice that affect the manner in which health issues become problematised. This paper proposes a humanistic model that aims to pay attention to the intricacies of human communication by addressing all of the above problems in turn. It interprets the sharing of meaning element in human communication and addresses the question of how the idea of health is created through discourse. As such, it offers a complementary and constructive paradigm and set of approaches to understand health, its meanings and communication.

  11. Modeling, methodologies and tools for molecular and nano-scale communications modeling, methodologies and tools

    CERN Document Server

    Nakano, Tadashi; Moore, Michael

    2017-01-01

    (Preliminary) The book presents the state of art in the emerging field of molecular and nanoscale communication. It gives special attention to fundamental models, and advanced methodologies and tools used in the field. It covers a wide range of applications, e.g. nanomedicine, nanorobot communication, bioremediation and environmental managements. It addresses advanced graduate students, academics and professionals working at the forefront in their fields and at the interfaces between different areas of research, such as engineering, computer science, biology and nanotechnology.

  12. Hydronic distribution system computer model

    Energy Technology Data Exchange (ETDEWEB)

    Andrews, J.W.; Strasser, J.J.

    1994-10-01

    A computer model of a hot-water boiler and its associated hydronic thermal distribution loop has been developed at Brookhaven National Laboratory (BNL). It is intended to be incorporated as a submodel in a comprehensive model of residential-scale thermal distribution systems developed at Lawrence Berkeley. This will give the combined model the capability of modeling forced-air and hydronic distribution systems in the same house using the same supporting software. This report describes the development of the BNL hydronics model, initial results and internal consistency checks, and its intended relationship to the LBL model. A method of interacting with the LBL model that does not require physical integration of the two codes is described. This will provide capability now, with reduced up-front cost, as long as the number of runs required is not large.

  13. An Empirical Analysis of the Effect of Text-Based Computer-Mediated Communication on Communicative Competence

    Institute of Scientific and Technical Information of China (English)

    WANG Jian-na

    2016-01-01

    It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts. It’s necessary to investigate the effect of text-based CMC on learners’communicative com-petence by conducting the method of systematic review. The findings implied that text-based CMC settings allowed learners to interact. The interaction provided learners with more opportunities to develop their communicative competence of target lan-guage.

  14. Virtual microscopy: merging of computer mediated communication and intuitive interfacing

    Science.gov (United States)

    de Ridder, Huib; de Ridder-Sluiter, Johanna G.; Kluin, Philip M.; Christiaans, Henri H. C. M.

    2009-02-01

    Ubiquitous computing (or Ambient Intelligence) is an upcoming technology that is usually associated with futuristic smart environments in which information is available anytime anywhere and with which humans can interact in a natural, multimodal way. However spectacular the corresponding scenarios may be, it is equally challenging to consider how this technology may enhance existing situations. This is illustrated by a case study from the Dutch medical field: central quality reviewing for pathology in child oncology. The main goal of the review is to assess the quality of the diagnosis based on patient material. The sharing of knowledge in social face-to-face interaction during such meeting is an important advantage. At the same time there is the disadvantage that the experts from the seven Dutch academic medical centers have to travel to the review meeting and that the required logistics to collect and bring patient material and data to the meeting is cumbersome and time-consuming. This paper focuses on how this time-consuming, nonefficient way of reviewing can be replaced by a virtual collaboration system by merging technology supporting Computer Mediated Collaboration and intuitive interfacing. This requires insight in the preferred way of communication and collaboration as well as knowledge about preferred interaction style with a virtual shared workspace.

  15. Locating hardware faults in a data communications network of a parallel computer

    Science.gov (United States)

    Archer, Charles J.; Megerian, Mark G.; Ratterman, Joseph D.; Smith, Brian E.

    2010-01-12

    Hardware faults location in a data communications network of a parallel computer. Such a parallel computer includes a plurality of compute nodes and a data communications network that couples the compute nodes for data communications and organizes the compute node as a tree. Locating hardware faults includes identifying a next compute node as a parent node and a root of a parent test tree, identifying for each child compute node of the parent node a child test tree having the child compute node as root, running a same test suite on the parent test tree and each child test tree, and identifying the parent compute node as having a defective link connected from the parent compute node to a child compute node if the test suite fails on the parent test tree and succeeds on all the child test trees.

  16. Towards scalable quantum communication and computation: Novel approaches and realizations

    Science.gov (United States)

    Jiang, Liang

    Quantum information science involves exploration of fundamental laws of quantum mechanics for information processing tasks. This thesis presents several new approaches towards scalable quantum information processing. First, we consider a hybrid approach to scalable quantum computation, based on an optically connected network of few-qubit quantum registers. Specifically, we develop a novel scheme for scalable quantum computation that is robust against various imperfections. To justify that nitrogen-vacancy (NV) color centers in diamond can be a promising realization of the few-qubit quantum register, we show how to isolate a few proximal nuclear spins from the rest of the environment and use them for the quantum register. We also demonstrate experimentally that the nuclear spin coherence is only weakly perturbed under optical illumination, which allows us to implement quantum logical operations that use the nuclear spins to assist the repetitive-readout of the electronic spin. Using this technique, we demonstrate more than two-fold improvement in signal-to-noise ratio. Apart from direct application to enhance the sensitivity of the NV-based nano-magnetometer, this experiment represents an important step towards the realization of robust quantum information processors using electronic and nuclear spin qubits. We then study realizations of quantum repeaters for long distance quantum communication. Specifically, we develop an efficient scheme for quantum repeaters based on atomic ensembles. We use dynamic programming to optimize various quantum repeater protocols. In addition, we propose a new protocol of quantum repeater with encoding, which efficiently uses local resources (about 100 qubits) to identify and correct errors, to achieve fast one-way quantum communication over long distances. Finally, we explore quantum systems with topological order. Such systems can exhibit remarkable phenomena such as quasiparticles with anyonic statistics and have been proposed as

  17. FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW

    Directory of Open Access Journals (Sweden)

    Gulshan Shrivastava

    2012-05-01

    Full Text Available In this paper, we deal with introducing a technique of digital forensics for reconstruction of events or evidences after the commitment of a crime through any of the digital devices. It shows a clear transparency between Computer Forensics and Digital Forensics and gives a brief description about the classification of Digital Forensics. It has also been described that how the emergences of various digital forensic models help digital forensic practitioners and examiners in doing digital forensics. Further, discussed Merits and Demerits of the required models and review of every major model.

  18. Pervasive Computing and Prosopopoietic Modelling

    DEFF Research Database (Denmark)

    Michelsen, Anders Ib

    2011-01-01

    that have spread vertiginiously since Mark Weiser coined the term ‘pervasive’, e.g., digitalised sensoring, monitoring, effectuation, intelligence, and display. Whereas Weiser’s original perspective may seem fulfilled since computing is everywhere, in his and Seely Brown’s (1997) terms, ‘invisible...... into the other. It also indicates a generative creation that itself points to important issues of ontology with methodological implications for the design of computing. In this article these implications will be conceptualised as prosopopoietic modeling on the basis of Bernward Joerges introduction......, pointing to a principal role of the paradoxical distinction/complicity within the computational heritage in three cases: a. Prosopopoietic aspects of John von Neumann’s First Draft of a Report on the EDVAC from 1945. b. Herbert Simon’s notion of simulation in The Science of the Artificial from the 1970s. c...

  19. Data communications in a parallel active messaging interface of a parallel computer

    Science.gov (United States)

    Archer, Charles J; Blocksome, Michael A; Ratterman, Joseph D; Smith, Brian E

    2013-10-29

    Data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the parallel computer including a plurality of compute nodes that execute a parallel application, the PAMI composed of data communications endpoints, each endpoint including a specification of data communications parameters for a thread of execution on a compute node, including specifications of a client, a context, and a task, the compute nodes and the endpoints coupled for data communications through the PAMI and through data communications resources, including receiving in an origin endpoint of the PAMI a data communications instruction, the instruction characterized by an instruction type, the instruction specifying a transmission of transfer data from the origin endpoint to a target endpoint and transmitting, in accordance with the instruction type, the transfer data from the origin endpoint to the target endpoint.

  20. Communication model of emuStudio emulation platform

    CERN Document Server

    Jakubčo, Peter; Ádám, Norbert

    2010-01-01

    Within the paper a description of communication model of plug-in based emuStudio emulation platform is given. The platform mentioned above allows the emulation of whole computer systems, configurable to the level of its components, represented by the plug-in modules of the platform. Development tasks still are in progress at the home institution of the authors. Currently the platform is exploited for teaching purposes within subjects aimed at machine-oriented languages and computer architectures. Versatility of the platform, given by its plug-in based architecture is a big advantage, when used as a teaching support tool. The paper briefly describes the emuStudio platform at its introductory part and then the mechanisms of inter-module communication are described.

  1. FY 1992 Blue Book: Grand Challenges: High Performance Computing and Communications

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — High performance computing and computer communications networks are becoming increasingly important to scientific advancement, economic competition, and national...

  2. FY 1995 Blue Book: High Performance Computing and Communications: Technology for the National Information Infrastructure

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Federal High Performance Computing and Communications HPCC Program was created to accelerate the development of future generations of high performance computers...

  3. FY 1993 Blue Book: Grand Challenges 1993: High Performance Computing and Communications

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — High performance computing and computer communications networks are becoming increasingly important to scientific advancement, economic competition, and national...

  4. Parallel computing in enterprise modeling.

    Energy Technology Data Exchange (ETDEWEB)

    Goldsby, Michael E.; Armstrong, Robert C.; Shneider, Max S.; Vanderveen, Keith; Ray, Jaideep; Heath, Zach; Allan, Benjamin A.

    2008-08-01

    This report presents the results of our efforts to apply high-performance computing to entity-based simulations with a multi-use plugin for parallel computing. We use the term 'Entity-based simulation' to describe a class of simulation which includes both discrete event simulation and agent based simulation. What simulations of this class share, and what differs from more traditional models, is that the result sought is emergent from a large number of contributing entities. Logistic, economic and social simulations are members of this class where things or people are organized or self-organize to produce a solution. Entity-based problems never have an a priori ergodic principle that will greatly simplify calculations. Because the results of entity-based simulations can only be realized at scale, scalable computing is de rigueur for large problems. Having said that, the absence of a spatial organizing principal makes the decomposition of the problem onto processors problematic. In addition, practitioners in this domain commonly use the Java programming language which presents its own problems in a high-performance setting. The plugin we have developed, called the Parallel Particle Data Model, overcomes both of these obstacles and is now being used by two Sandia frameworks: the Decision Analysis Center, and the Seldon social simulation facility. While the ability to engage U.S.-sized problems is now available to the Decision Analysis Center, this plugin is central to the success of Seldon. Because Seldon relies on computationally intensive cognitive sub-models, this work is necessary to achieve the scale necessary for realistic results. With the recent upheavals in the financial markets, and the inscrutability of terrorist activity, this simulation domain will likely need a capability with ever greater fidelity. High-performance computing will play an important part in enabling that greater fidelity.

  5. Cosmic logic: a computational model

    Science.gov (United States)

    Vanchurin, Vitaly

    2016-02-01

    We initiate a formal study of logical inferences in context of the measure problem in cosmology or what we call cosmic logic. We describe a simple computational model of cosmic logic suitable for analysis of, for example, discretized cosmological systems. The construction is based on a particular model of computation, developed by Alan Turing, with cosmic observers (CO), cosmic measures (CM) and cosmic symmetries (CS) described by Turing machines. CO machines always start with a blank tape and CM machines take CO's Turing number (also known as description number or Gödel number) as input and output the corresponding probability. Similarly, CS machines take CO's Turing number as input, but output either one if the CO machines are in the same equivalence class or zero otherwise. We argue that CS machines are more fundamental than CM machines and, thus, should be used as building blocks in constructing CM machines. We prove the non-computability of a CS machine which discriminates between two classes of CO machines: mortal that halts in finite time and immortal that runs forever. In context of eternal inflation this result implies that it is impossible to construct CM machines to compute probabilities on the set of all CO machines using cut-off prescriptions. The cut-off measures can still be used if the set is reduced to include only machines which halt after a finite and predetermined number of steps.

  6. Minimal models of multidimensional computations.

    Directory of Open Access Journals (Sweden)

    Jeffrey D Fitzgerald

    2011-03-01

    Full Text Available The multidimensional computations performed by many biological systems are often characterized with limited information about the correlations between inputs and outputs. Given this limitation, our approach is to construct the maximum noise entropy response function of the system, leading to a closed-form and minimally biased model consistent with a given set of constraints on the input/output moments; the result is equivalent to conditional random field models from machine learning. For systems with binary outputs, such as neurons encoding sensory stimuli, the maximum noise entropy models are logistic functions whose arguments depend on the constraints. A constraint on the average output turns the binary maximum noise entropy models into minimum mutual information models, allowing for the calculation of the information content of the constraints and an information theoretic characterization of the system's computations. We use this approach to analyze the nonlinear input/output functions in macaque retina and thalamus; although these systems have been previously shown to be responsive to two input dimensions, the functional form of the response function in this reduced space had not been unambiguously identified. A second order model based on the logistic function is found to be both necessary and sufficient to accurately describe the neural responses to naturalistic stimuli, accounting for an average of 93% of the mutual information with a small number of parameters. Thus, despite the fact that the stimulus is highly non-Gaussian, the vast majority of the information in the neural responses is related to first and second order correlations. Our results suggest a principled and unbiased way to model multidimensional computations and determine the statistics of the inputs that are being encoded in the outputs.

  7. Modeling radio communication blackout and blackout mitigation in hypersonic vehicles

    CERN Document Server

    Kundrapu, Madhusudhan; Beckwith, Kristian; Stoltz, Peter; Shashurin, Alexey; Keidar, Michael

    2014-01-01

    A procedure for the modeling and analysis of radio communication blackout of hypersonic vehicles is presented. A weakly ionized plasma generated around the surface of a hypersonic reentry vehicle traveling at Mach 23 was simulated using full Navier-Stokes equations in multi-species single fluid form. A seven species air chemistry model is used to compute the individual species densities in air including ionization - plasma densities are compared with experiment. The electromagnetic wave's interaction with the plasma layer is modeled using multi-fluid equations for fluid transport and full Maxwell's equations for the electromagnetic fields. The multi-fluid solver is verified for a whistler wave propagating through a slab. First principles radio communication blackout over a hypersonic vehicle is demonstrated along with a simple blackout mitigation scheme using a magnetic window.

  8. A Swarm Intelligence Based Model for Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ahmed S. Salama

    2015-01-01

    Full Text Available Mobile Computing (MC provides multi services and a lot of advantages for millions of users across the world over the internet. Millions of business customers have leveraged cloud computing services through mobile devices to get what is called Mobile Cloud Computing (MCC. MCC aims at using cloud computing techniques for storage and processing of data on mobile devices, thereby reducing their limitations. This paper proposes architecture for a Swarm Intelligence Based Mobile Cloud Computing Model (SIBMCCM. A model that uses a proposed Parallel Particle Swarm Optimization (PPSO algorithm to enhance the access time for the mobile cloud computing services which support different E Commerce models and to better secure the communication through the mobile cloud and the mobile commerce transactions.

  9. Department of Energy Mathematical, Information, and Computational Sciences Division: High Performance Computing and Communications Program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-11-01

    This document is intended to serve two purposes. Its first purpose is that of a program status report of the considerable progress that the Department of Energy (DOE) has made since 1993, the time of the last such report (DOE/ER-0536, The DOE Program in HPCC), toward achieving the goals of the High Performance Computing and Communications (HPCC) Program. The second purpose is that of a summary report of the many research programs administered by the Mathematical, Information, and Computational Sciences (MICS) Division of the Office of Energy Research under the auspices of the HPCC Program and to provide, wherever relevant, easy access to pertinent information about MICS-Division activities via universal resource locators (URLs) on the World Wide Web (WWW).

  10. Department of Energy: MICS (Mathematical Information, and Computational Sciences Division). High performance computing and communications program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-06-01

    This document is intended to serve two purposes. Its first purpose is that of a program status report of the considerable progress that the Department of Energy (DOE) has made since 1993, the time of the last such report (DOE/ER-0536, {open_quotes}The DOE Program in HPCC{close_quotes}), toward achieving the goals of the High Performance Computing and Communications (HPCC) Program. The second purpose is that of a summary report of the many research programs administered by the Mathematical, Information, and Computational Sciences (MICS) Division of the Office of Energy Research under the auspices of the HPCC Program and to provide, wherever relevant, easy access to pertinent information about MICS-Division activities via universal resource locators (URLs) on the World Wide Web (WWW). The information pointed to by the URL is updated frequently, and the interested reader is urged to access the WWW for the latest information.

  11. Social Identification and Interpersonal Communication in Computer-Mediated Communication: What You Do versus Who You Are in Virtual Groups

    Science.gov (United States)

    Wang, Zuoming; Walther, Joseph B.; Hancock, Jeffrey T.

    2009-01-01

    This study investigates the influence of interpersonal communication and intergroup identification on members' evaluations of computer-mediated groups. Participants (N= 256) in 64 four-person groups interacted through synchronous computer chat. Subgroup assignments to minimal groups instilled significantly greater in-group versus out-group…

  12. Effects of Gender on Computer-Mediated Communication: A Survey of University Faculty

    Science.gov (United States)

    Valenziano, Laura

    2007-01-01

    The influence of gender on computer-mediated communication is a research area with tremendous growth. This study sought to determine what gender effects exist in email communication between professors and students. The study also explored the amount of lying and misinterpretation that occurs through online communication. The study results indicate…

  13. The Use of Computer-Mediated Communication To Enhance Subsequent Face-to-Face Discussions.

    Science.gov (United States)

    Dietz-Uhler, Beth; Bishop-Clark, Cathy

    2001-01-01

    Describes a study of undergraduate students that assessed the effects of synchronous (Internet chat) and asynchronous (Internet discussion board) computer-mediated communication on subsequent face-to-face discussions. Results showed that face-to-face discussions preceded by computer-mediated communication were perceived to be more enjoyable.…

  14. 77 FR 38826 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Science.gov (United States)

    2012-06-29

    ... COMMISSION Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and... importation, and the sale within the United States after importation of certain wireless communication devices, portable music and data processing devices, computers and components thereof by reason of infringement...

  15. The Construction of Knowledge through Social Interaction via Computer-Mediated Communication

    Science.gov (United States)

    Saritas, Tuncay

    2008-01-01

    With the advance in information and communication technologies, computer-mediated communication--more specifically computer conferencing systems (CCS)--has captured the interest of educators as an ideal tool to create a learning environment featuring active, participative, and reflective learning. Educators are increasingly adapting the features…

  16. Ethics and computer-mediated communication: implications for practice and policy.

    Science.gov (United States)

    Torrance, Rebecca J; Lasome, Caterina E M; Agazio, Janice B

    2002-06-01

    Computer-mediated communication, or email, has become a common workplace practice. Interviews with Army nurse managers (n = 9) and their staff nurses (n = 13) revealed that nurses incorporate the ethical principles of autonomy, beneficence, nonmaleficence, and justice into their computer-mediated communication use, but to varying degrees. Without clearly defined policies to guide computer-mediated communication practices, informal norms evolve that have an impact on both individual and corporate communication. The authors provide insight into the ethical considerations that have an impact on computer-mediated communication use. The spectrum of participant interpretation of appropriate use of this type of communication suggests the need for policies to establish clear boundaries for workplace usage. Policy recommendations are included.

  17. ESL STUDENTS' COMPUTER-MEDIATED COMMUNICATION PRACTICES: CONTEXT CONFIGURATION

    Directory of Open Access Journals (Sweden)

    Dong-Shin Shin

    2006-09-01

    Full Text Available This paper examines how context is configured in ESL students’ language learning practices through computer-mediated communication (CMC. Specifically, I focus on how a group of ESL students jointly constructed the context of their CMC activities through interactional patterns and norms, and how configured affordances within the CMC environment mediated their learning experiences. After a brief review of relevant studies of CMC in the literature, I discuss ecological perspectives of language learning as a core construct of this study, to explain contextual fluidity in relation to learners’ agency in their learning. Next, I present an ethnographic study of how members of an ESL class constructed a community of social practices through synchronous CMC. The findings indicate that (a the constructed interactional patterns and norms of the students’ CMC activities represented group dynamics among the participants, (b the participants’ roles in joint construction of the activities reflected their language socialization experiences, and (c the activities provided a way for spousal participants to assume academic identities, while becoming a social space for academic gatherings. This study highlights the fluidity of CMC language learning contexts; fluid contexts entail learners’ agency in dialogic engagements with the contextual elements of the learning environment as language socialization processes.

  18. A Molecular Communication System Model for Particulate Drug Delivery Systems.

    Science.gov (United States)

    Chahibi, Youssef; Pierobon, Massimiliano; Song, Sang Ok; Akyildiz, Ian F

    2013-12-01

    The goal of a drug delivery system (DDS) is to convey a drug where the medication is needed, while, at the same time, preventing the drug from affecting other healthy parts of the body. Drugs composed of micro- or nano-sized particles (particulate DDS) that are able to cross barriers which prevent large particles from escaping the bloodstream are used in the most advanced solutions. Molecular communication (MC) is used as an abstraction of the propagation of drug particles in the body. MC is a new paradigm in communication research where the exchange of information is achieved through the propagation of molecules. Here, the transmitter is the drug injection, the receiver is the drug delivery, and the channel is realized by the transport of drug particles, thus enabling the analysis and design of a particulate DDS using communication tools. This is achieved by modeling the MC channel as two separate contributions, namely, the cardiovascular network model and the drug propagation network. The cardiovascular network model allows to analytically compute the blood velocity profile in every location of the cardiovascular system given the flow input by the heart. The drug propagation network model allows the analytical expression of the drug delivery rate at the targeted site given the drug injection rate. Numerical results are also presented to assess the flexibility and accuracy of the developed model. The study of novel optimization techniques for a more effective and less invasive drug delivery will be aided by this model, while paving the way for novel communication techniques for Intrabody communication networks.

  19. High Performance Computing tools for the Integrated Tokamak Modelling project

    Energy Technology Data Exchange (ETDEWEB)

    Guillerminet, B., E-mail: bernard.guillerminet@cea.f [Association Euratom-CEA sur la Fusion, IRFM, DSM, CEA Cadarache (France); Plasencia, I. Campos [Instituto de Fisica de Cantabria (IFCA), CSIC, Santander (Spain); Haefele, M. [Universite Louis Pasteur, Strasbourg (France); Iannone, F. [EURATOM/ENEA Fusion Association, Frascati (Italy); Jackson, A. [University of Edinburgh (EPCC) (United Kingdom); Manduchi, G. [EURATOM/ENEA Fusion Association, Padova (Italy); Plociennik, M. [Poznan Supercomputing and Networking Center (PSNC) (Poland); Sonnendrucker, E. [Universite Louis Pasteur, Strasbourg (France); Strand, P. [Chalmers University of Technology (Sweden); Owsiak, M. [Poznan Supercomputing and Networking Center (PSNC) (Poland)

    2010-07-15

    Fusion Modelling and Simulation are very challenging and the High Performance Computing issues are addressed here. Toolset for jobs launching and scheduling, data communication and visualization have been developed by the EUFORIA project and used with a plasma edge simulation code.

  20. Cosmic Logic: a Computational Model

    CERN Document Server

    Vanchurin, Vitaly

    2015-01-01

    We describe a simple computational model of cosmic logic suitable for analysis of, for example, discretized cosmological systems. The construction is based on a particular model of computation, developed by Alan Turing, with cosmic observers (CO), cosmic measures (CM) and cosmic symmetries (CS) described by Turing machines. CO machines always start with a blank tape and CM machines take CO's Turing number (also known as description number or G{\\" o}del number) as input and output the corresponding probability. Similarly, CS machines take CO's Turing number as input, but output either one if the CO machines are in the same equivalence class or zero otherwise. We argue that CS machines are more fundamental than CM machines and, thus, should be used as building blocks in constructing CM machines. We prove the non-computability of a CS machine which discriminates between two classes of CO machines: mortal that halts in finite time and immortal that runs forever. In context of eternal inflation this result implies...

  1. Thermal noise informatics: Totally secure communication via a wire; Zero-power communication; and Thermal noise driven computing

    CERN Document Server

    Kish, Laszlo B; gingl, Zoltan

    2007-01-01

    Very recently, it has been shown that Gaussian thermal noise and its artificial versions (Johnson-like noises) can be utilized as an information carrier with peculiar properties therefore it may be proper to call this topic Thermal Noise Informatics. Zero Power (Stealth) Communication, Thermal Noise Driven Computing, and Totally Secure Classical Communication are relevant examples. In this paper, while we will briefly describe the first and the second subjects, we shall focus on the third subject, the secure classical communication via wire. This way of secure telecommunication utilizes the properties of Johnson(-like) noise and those of a simple Kirchhoff's loop. The communicator is unconditionally secure at the conceptual (circuit theoretical) level and this property is (so far) unique in communication systems based on classical physics. The communicator is superior to quantum alternatives in all known aspects, except the need of using a wire.

  2. Computational Modeling in Tissue Engineering

    CERN Document Server

    2013-01-01

    One of the major challenges in tissue engineering is the translation of biological knowledge on complex cell and tissue behavior into a predictive and robust engineering process. Mastering this complexity is an essential step towards clinical applications of tissue engineering. This volume discusses computational modeling tools that allow studying the biological complexity in a more quantitative way. More specifically, computational tools can help in:  (i) quantifying and optimizing the tissue engineering product, e.g. by adapting scaffold design to optimize micro-environmental signals or by adapting selection criteria to improve homogeneity of the selected cell population; (ii) quantifying and optimizing the tissue engineering process, e.g. by adapting bioreactor design to improve quality and quantity of the final product; and (iii) assessing the influence of the in vivo environment on the behavior of the tissue engineering product, e.g. by investigating vascular ingrowth. The book presents examples of each...

  3. Processing data communications events by awakening threads in parallel active messaging interface of a parallel computer

    Energy Technology Data Exchange (ETDEWEB)

    Archer, Charles J.; Blocksome, Michael A.; Ratterman, Joseph D.; Smith, Brian E.

    2016-03-15

    Processing data communications events in a parallel active messaging interface (`PAMI`) of a parallel computer that includes compute nodes that execute a parallel application, with the PAMI including data communications endpoints, and the endpoints are coupled for data communications through the PAMI and through other data communications resources, including determining by an advance function that there are no actionable data communications events pending for its context, placing by the advance function its thread of execution into a wait state, waiting for a subsequent data communications event for the context; responsive to occurrence of a subsequent data communications event for the context, awakening by the thread from the wait state; and processing by the advance function the subsequent data communications event now pending for the context.

  4. Interpreting network communicability with stochastic models and data

    CERN Document Server

    Colman, Ewan

    2016-01-01

    The recently introduced concept of dynamic communicability is a valuable tool for ranking the importance of nodes in a temporal network. Two metrics, broadcast score and receive score, were introduced to measure the centrality of a node with respect to a model of contagion based on time-respecting walks. This article examines the temporal and structural factors influencing these metrics by considering a versatile stochastic temporal network model. We analytically derive formulae to accurately predict the expectation of the broadcast and receive scores when one or more columns in a temporal edge-list are shuffled. These methods are then applied to two publicly available data-sets and we quantify how much the centrality of each individual depends on structural or temporal influences. From our analysis we highlight two practical contributions: a way to control for temporal variation when computing dynamic communicability, and the conclusion that the broadcast and receive scores can, under a range of circumstance...

  5. Business model elements impacting cloud computing adoption

    DEFF Research Database (Denmark)

    Bogataj, Kristina; Pucihar, Andreja; Sudzina, Frantisek

    The paper presents a proposed research framework for identification of business model elements impacting Cloud Computing Adoption. We provide a definition of main Cloud Computing characteristics, discuss previous findings on factors impacting Cloud Computing Adoption, and investigate technology...... adoption theories, such as Diffusion of Innovations, Technology Acceptance Model, Unified Theory of Acceptance and Use of Technology. Further on, at research model for identification of Cloud Computing Adoption factors from a business model perspective is presented. The following business model building...

  6. Business model elements impacting cloud computing adoption

    DEFF Research Database (Denmark)

    Bogataj, Kristina; Pucihar, Andreja; Sudzina, Frantisek

    adoption theories, such as Diffusion of Innovations, Technology Acceptance Model, Unified Theory of Acceptance and Use of Technology. Further on, at research model for identification of Cloud Computing Adoption factors from a business model perspective is presented. The following business model building......The paper presents a proposed research framework for identification of business model elements impacting Cloud Computing Adoption. We provide a definition of main Cloud Computing characteristics, discuss previous findings on factors impacting Cloud Computing Adoption, and investigate technology...

  7. MODEL IDENTIFICATION AND COMPUTER ALGEBRA.

    Science.gov (United States)

    Bollen, Kenneth A; Bauldry, Shawn

    2010-10-07

    Multiequation models that contain observed or latent variables are common in the social sciences. To determine whether unique parameter values exist for such models, one needs to assess model identification. In practice analysts rely on empirical checks that evaluate the singularity of the information matrix evaluated at sample estimates of parameters. The discrepancy between estimates and population values, the limitations of numerical assessments of ranks, and the difference between local and global identification make this practice less than perfect. In this paper we outline how to use computer algebra systems (CAS) to determine the local and global identification of multiequation models with or without latent variables. We demonstrate a symbolic CAS approach to local identification and develop a CAS approach to obtain explicit algebraic solutions for each of the model parameters. We illustrate the procedures with several examples, including a new proof of the identification of a model for handling missing data using auxiliary variables. We present an identification procedure for Structural Equation Models that makes use of CAS and that is a useful complement to current methods.

  8. Communicating and reporting on the business model

    DEFF Research Database (Denmark)

    Nielsen, Christian; Lund, Morten

    2014-01-01

    The problem – as well as the prospect – with business models is that they are concerned with being different; as business in general thrives on some sort of unique selling point. So the bundle of indicators on value creation, business models, strategy, intellectual capital, and so on, which...... will be relevant to analyze or communicate about will differ from firm to firm. Therefore, this chapter focuses on the business model as the integrating concept for reporting and analysis of strategic types of information on e.g. management strategies, critical success factors, risk factors and value drivers....

  9. Los Alamos Center for Computer Security formal computer security model

    Energy Technology Data Exchange (ETDEWEB)

    Dreicer, J.S.; Hunteman, W.J.; Markin, J.T.

    1989-01-01

    This paper provides a brief presentation of the formal computer security model currently being developed at the Los Alamos Department of Energy (DOE) Center for Computer Security (CCS). The need to test and verify DOE computer security policy implementation first motivated this effort. The actual analytical model was a result of the integration of current research in computer security and previous modeling and research experiences. The model is being developed to define a generic view of the computer and network security domains, to provide a theoretical basis for the design of a security model, and to address the limitations of present formal mathematical models for computer security. The fundamental objective of computer security is to prevent the unauthorized and unaccountable access to a system. The inherent vulnerabilities of computer systems result in various threats from unauthorized access. The foundation of the Los Alamos DOE CCS model is a series of functionally dependent probability equations, relations, and expressions. The model is undergoing continued discrimination and evolution. We expect to apply the model to the discipline of the Bell and LaPadula abstract sets of objects and subjects. 6 refs.

  10. Implementation of computational model for the evaluation of electromagnetic susceptibility of the cables for communication and control of high voltage substations; Implementacao de modelo computacional para a avaliacao da suscetibilidade eletromagnetica dos cabos de comunicacao e controle de subestacoes de alta tensao

    Energy Technology Data Exchange (ETDEWEB)

    Sartin, Antonio C.P. [Companhia de Transmissao de Energia Eletrica Paulista (CTEEP), Bauru, SP (Brazil); Dotto, Fabio R.L.; Sant' Anna, Cezar J.; Thomazella, Rogerio [Fundacao para o Desenvolvimento de Bauru, SP (Brazil); Ulson, Jose A.C.; Aguiar, Paulo R. de [Universidade Estadual Paulista Julio de Mesquita Filho (UNESP), Bauru, SP (Brazil)

    2009-07-01

    This work show the implementation of a electromagnetic model for supervision cable, protection, communication and high voltage substations control that was investigated in literature and adapted. The model was implemented by using a computational tool in order to obtain the electromagnetic behavior of various cables used in CTEEP substation, subject to several sources of electromagnetic interference in this inhospitable environment, such as lightning strikes, outbreaks of maneuvers switching and the corona effect. The results obtained in computer simulations were compared with results of laboratory tests carried out on a lot of cables that represent those systems that are present in substations 440 kV. This study characterized the electromagnetic interference, ranked them, identified possible susceptible points in the substation, which contributed to the development of a technical procedure that minimizes unwanted effects caused in communication systems and substation control. This developed procedure also assured the maximum reliability and availability in the operation of the electrical power system to the company.

  11. Lunar Pole Illumination and Communications Statistics Computed from GSSR Elevation Data

    Science.gov (United States)

    Bryant, Scott

    2010-01-01

    The Goldstone Solar System RADAR (GSSR) group at JPL produced a Digital Elevation Model (DEM) of the lunar south pole using data obtained in 2006. This model has 40-meter horizontal resolution and about 5-meter relative vertical accuracy. This paper uses that Digital Elevation Model to compute average solar illumination and Earth visibility near the lunar south pole. This data quantifies solar power and Earth communications resources at proposed lunar base locations. The elevation data were converted into local terrain horizon masks, then converted into selenographic latitude and longitude coordinates. The horizon masks were compared to latitude, longitude regions bounding the maximum Sun and Earth motions relative to the moon. Proposed lunar south pole base sites were examined in detail, with the best site showing multi-year averages of solar power availability of 92% and Direct-To-Earth (DTE) communication availability of about 50%. Results are compared with a theoretical model, and with actual sun and Earth visibility averaged over the years 2009 to 2028. Results for the lunar North pole were computed using the GSSR DEM of the lunar North pole produced in 1997. The paper also explores using a heliostat to reduce the photovoltaic power system mass and complexity.

  12. Managing internode data communications for an uninitialized process in a parallel computer

    Science.gov (United States)

    Archer, Charles J; Blocksome, Michael A; Miller, Douglas R; Parker, Jeffrey J; Ratterman, Joseph D; Smith, Brian E

    2014-05-20

    A parallel computer includes nodes, each having main memory and a messaging unit (MU). Each MU includes computer memory, which in turn includes, MU message buffers. Each MU message buffer is associated with an uninitialized process on the compute node. In the parallel computer, managing internode data communications for an uninitialized process includes: receiving, by an MU of a compute node, one or more data communications messages in an MU message buffer associated with an uninitialized process on the compute node; determining, by an application agent, that the MU message buffer associated with the uninitialized process is full prior to initialization of the uninitialized process; establishing, by the application agent, a temporary message buffer for the uninitialized process in main computer memory; and moving, by the application agent, data communications messages from the MU message buffer associated with the uninitialized process to the temporary message buffer in main computer memory.

  13. International Conference on Computational Intelligence, Cyber Security, and Computational Models

    CERN Document Server

    Ramasamy, Vijayalakshmi; Sheen, Shina; Veeramani, C; Bonato, Anthony; Batten, Lynn

    2016-01-01

    This book aims at promoting high-quality research by researchers and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security, and Computational Models ICC3 2015 organized by PSG College of Technology, Coimbatore, India during December 17 – 19, 2015. This book enriches with innovations in broad areas of research like computational modeling, computational intelligence and cyber security. These emerging inter disciplinary research areas have helped to solve multifaceted problems and gained lot of attention in recent years. This encompasses theory and applications, to provide design, analysis and modeling of the aforementioned key areas.

  14. Model of Advertising Communication in Sport

    Directory of Open Access Journals (Sweden)

    Stevo Popović

    2016-02-01

    Full Text Available The objective of this study represent the advertising communication, while the main goal will be directional to creating of advertising model with specific retrospection in sport. The main tasks of this study are, the first conducting a situational analysis, then setting objectives for advertising, deciding on the budget funds, choosing the target market, creation of the advertising messages, selection of appropriate media, as well as evaluating effectiveness of advertising. During the making of this study, the author used descriptive method with consulting of competent literature. The previous author’ experience in this field was also so useful. Moreover, the author used the analytic method and parallel method that is the most productive if you make some inferences about some appearance. Consequently, the main outcome of this study was creation of conceptual model of advertising communication with special application in sport industry.

  15. Critical phenomena in communication/computation networks with various topologies and suboptimal to optimal resource allocation

    Science.gov (United States)

    Cogoni, Marco; Busonera, Giovanni; Anedda, Paolo; Zanetti, Gianluigi

    2015-01-01

    We generalize previous studies on critical phenomena in communication networks [1,2] by adding computational capabilities to the nodes. In our model, a set of tasks with random origin, destination and computational structure is distributed on a computational network, modeled as a graph. By varying the temperature of a Metropolis Montecarlo, we explore the global latency for an optimal to suboptimal resource assignment at a given time instant. By computing the two-point correlation function for the local overload, we study the behavior of the correlation distance (both for links and nodes) while approaching the congested phase: a transition from peaked to spread g(r) is seen above a critical (Montecarlo) temperature Tc. The average latency trend of the system is predicted by averaging over several network traffic realizations while maintaining a spatially detailed information for each node: a sharp decrease of performance is found over Tc independently of the workload. The globally optimized computational resource allocation and network routing defines a baseline for a future comparison of the transition behavior with respect to existing routing strategies [3,4] for different network topologies.

  16. Computer-Mediated Word-of-Mouth Communication: The Influence of Mixed Reviews on Student Perceptions of Instructors and Courses

    Science.gov (United States)

    Edwards, Autumn; Edwards, Chad

    2013-01-01

    The purpose of this experiment was to test the influence of mixed reviews appearing as computer-mediated word-of-mouth communication (WOM) on student perceptions of instructors (attractiveness and credibility) and attitudes toward learning course content (affective learning and state motivation). Using the heuristic-systematic processing model, it…

  17. High performance computing and communications: Advancing the frontiers of information technology

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-12-31

    This report, which supplements the President`s Fiscal Year 1997 Budget, describes the interagency High Performance Computing and Communications (HPCC) Program. The HPCC Program will celebrate its fifth anniversary in October 1996 with an impressive array of accomplishments to its credit. Over its five-year history, the HPCC Program has focused on developing high performance computing and communications technologies that can be applied to computation-intensive applications. Major highlights for FY 1996: (1) High performance computing systems enable practical solutions to complex problems with accuracies not possible five years ago; (2) HPCC-funded research in very large scale networking techniques has been instrumental in the evolution of the Internet, which continues exponential growth in size, speed, and availability of information; (3) The combination of hardware capability measured in gigaflop/s, networking technology measured in gigabit/s, and new computational science techniques for modeling phenomena has demonstrated that very large scale accurate scientific calculations can be executed across heterogeneous parallel processing systems located thousands of miles apart; (4) Federal investments in HPCC software R and D support researchers who pioneered the development of parallel languages and compilers, high performance mathematical, engineering, and scientific libraries, and software tools--technologies that allow scientists to use powerful parallel systems to focus on Federal agency mission applications; and (5) HPCC support for virtual environments has enabled the development of immersive technologies, where researchers can explore and manipulate multi-dimensional scientific and engineering problems. Educational programs fostered by the HPCC Program have brought into classrooms new science and engineering curricula designed to teach computational science. This document contains a small sample of the significant HPCC Program accomplishments in FY 1996.

  18. Computational modelling of SCC flow

    DEFF Research Database (Denmark)

    Geiker, Mette Rica; Thrane, Lars Nyholm; Szabo, Peter

    2005-01-01

    To benefit from the full potential of self-compacting concrete (SCC) prediction tools are needed for the form filling of SCC. Such tools should take into account the properties of the concrete, the shape and size of the structural element, the position of rebars, and the casting technique. Exampl...... of computational models for the time dependent flow behavior are given, and advantages and disadvantages of discrete particle and single fluid models are briefly described.......To benefit from the full potential of self-compacting concrete (SCC) prediction tools are needed for the form filling of SCC. Such tools should take into account the properties of the concrete, the shape and size of the structural element, the position of rebars, and the casting technique. Examples...

  19. Computer modeling of piezoresistive gauges

    Energy Technology Data Exchange (ETDEWEB)

    Nutt, G. L.; Hallquist, J. O.

    1981-08-07

    A computer model of a piezoresistive gauge subject to shock loading is developed. The time-dependent two-dimensional response of the gauge is calculated. The stress and strain components of the gauge are determined assuming elastic-plastic material properties. The model is compared with experiment for four cases. An ytterbium foil gauge in a PPMA medum subjected to a 0.5 Gp plane shock wave, where the gauge is presented to the shock with its flat surface both parallel and perpendicular to the front. A similar comparison is made for a manganin foil subjected to a 2.7 Gp shock. The signals are compared also with a calibration equation derived with the gauge and medium properties accounted for but with the assumption that the gauge is in stress equilibrium with the shocked medium.

  20. Towards the Epidemiological Modeling of Computer Viruses

    OpenAIRE

    Xiaofan Yang; Lu-Xing Yang

    2012-01-01

    Epidemic dynamics of computer viruses is an emerging discipline aiming to understand the way that computer viruses spread on networks. This paper is intended to establish a series of rational epidemic models of computer viruses. First, a close inspection of some common characteristics shared by all typical computer viruses clearly reveals the flaws of previous models. Then, a generic epidemic model of viruses, which is named as the SLBS model, is proposed. Finally, diverse generalizations of ...

  1. Identifiability and self-presentation: computer-mediated communication and intergroup interaction.

    Science.gov (United States)

    Douglas, K M; McGarty, C

    2001-09-01

    This research investigated the intergroup properties of hostile 'flaming' behaviour in computer-mediated communication and how flaming language is affected by Internet identifiability, or identifiability by name and e-mail address/geographical location as is common to Internet communication. According to the Social Identity Model of Deindividuation Effects (SIDE; e.g. Reicher, Spears, & Postmes, 1995) there may be strategic reasons for identifiable groups members to act in a more group-normative manner in the presence of an audience, to gain acceptance from the in-group, to avoid punishment from the out-group, or to assert their identity to the out-group. For these reasons, it was predicted that communicators would produce more stereotype-consistent (group-normative) descriptions of out-group members' behaviours when their descriptions were identifiable to an audience. In one archival and three experimental studies, it was found that identifiability to an in-group audience was associated with higher levels of stereotype-consistent language when communicators described anonymous out-group targets. These results extend SIDE and suggest the importance of an in-group audience for the expression of stereotypical views.

  2. The "fascist" discourse in computer mediated communication: the "dual strategy" model of the Italian Extreme Right O discurso "fascista" na comunicação mediada por computador: o modelo de "estratégia dupla" da Extrema Direita Italiana

    Directory of Open Access Journals (Sweden)

    Luca Tateo

    2008-08-01

    Full Text Available The study is about the identity construction of Italian Extreme Right groups in different Computer Mediated Communication (CMC environments. Rhetoric Psychology and Critical Discourse Analysis joint approaches are used to analyse two websites and two newsgroups of extreme right. The results confirm Billig's hypothesis that such groups play a dual communication strategy in Computer Mediated Communication, addressing in different ways to the outgroup and the ingroup. This communication strategy has two different functions. In self-presentation towards the outgroup, the emerging group identity fulfils the search for a wider social legitimation, consensus and recruiting. In the ingroup communication, the emerging identity construction answers to the need for preservation of group cohesion and positive self-image.Este estudo é sobre a construção da identidade dos grupos Italianos de Extrema Direita em diferentes ambientes de Comunicação Mediada por Computador (CMC. As duas abordagens, Psicologia Retórica e Análise Crítica do Discurso são usadas para analisar dois websites e dois grupos de notícias de extrema direita. Os resultados confirmam a hipótese de Billig de que tais grupos desempenham um duplo papel na estratégia de comunicação na Comunicação Mediada por Computador, dirigindo-se de diferentes maneiras ao grupo externo e ao interno. Esta estratégia de comunicação tem duas funções distintas. Na auto-apresentação feita em direção ao grupo externo, a identidade emergente do grupo satisfaz a busca para uma legitimação social, consenso e recrutamento mais amplos. Na comunicação com o grupo interno, a construção da identidade emergente responde a necessidade de preservação da coesão do grupo e de uma auto-imagem positiva.

  3. Communications Centre Model in Insurance Business

    Directory of Open Access Journals (Sweden)

    Danijel Bara

    2013-07-01

    Full Text Available The aim of this paper is to define a communications centre model in an insurance company that essentially has two objectives. The first objective is focused on providing quality support with the sales process thereby creating a strategic advantage over the competition while the second objective is focused on improving the link between internal organizational units whose behaviour can often render decision-making at all levels difficult. The function of sales is fundamental for an insurance company. Whether an insurance company will fulfil its basic function, which is transfer of risk from the insured party to the insurer who agrees tonreimburse incidental damages to the damaged party and distribute them among all members of the risk group on the principles of reciprocity and solidarity, depends on successful sales and billing (Andrijašević & Petranović, 1999. For an insurance company to operate successfully in a demanding market, it is necessary to meet the needs of potential clients who then must be at the centre of all the activities of the insurer. A satisfied policy holder, who is respected by the insurer as a partner, is a guarantee that the sales of insurance services will be successful and that the insured party will come back to the same insurance company. In the era of globalization and all-pervading new technologies and modes of communication, policy holders need to be able to communicate with insurance company employees. Quality communication is a good foundation for a sales conversation. A fast flow of all types of information within an organisation using a single communication module makes decision-making at all levels quicker and easier.

  4. Use Patterns of Visual Cues in Computer-Mediated Communication

    Science.gov (United States)

    Bolliger, Doris U.

    2009-01-01

    Communication in the virtual environment can be challenging for participants because it lacks physical presence and nonverbal elements. Participants may have difficulties expressing their intentions and emotions in a primarily text-based course. Therefore, the use of visual communication elements such as pictographic and typographic marks can be…

  5. The Human Dimension of Computer-Mediated Communications: Implications for International Educational Computer Conferences.

    Science.gov (United States)

    Scott, Douglass J.

    This article presents a conceptual framework for the research and practice of educational computer conferences that shifts the focus from the on-line messages being exchanged to the participants' engagement with the conference. This framework, known as the "Iceberg Metaphor" or the "Michigan Model of educational…

  6. Marketing communications model for innovation networks

    Directory of Open Access Journals (Sweden)

    Tiago João Freitas Correia

    2015-10-01

    Full Text Available Innovation is an increasingly relevant concept for the success of any organization, but it also represents a set of internal and external considerations, barriers and challenges to overcome. Along the concept of innovation, new paradigms emerge such as open innovation and co-creation that are simultaneously innovation modifiers and intensifiers in organizations, promoting organizational openness and stakeholder integration within the value creation process. Innovation networks composed by a multiplicity of agents in co-creative work perform as innovation mechanisms to face the increasingly complexity of products, services and markets. Technology, especially the Internet, is an enabler of all process among organizations supported by co-creative platforms for innovation. The definition of marketing communication strategies that promote motivation and involvement of all stakeholders in synergic creation and external promotion is the central aspect of this research. The implementation of the projects is performed by participative workshops with stakeholders from Madan Parque through IDEAS(REVOLUTION methodology and the operational model LinkUp parameterized for the project. The project is divided into the first part, the theoretical framework, and the second part where a model is developed for the marketing communication strategies that appeal to the Madan Parque case study. Keywords: Marketing Communication; Open Innovation, Technology; Innovation Networks; Incubator; Co-Creation.

  7. The Theoretical Foundation for Intercultural Business Communication: A Conceptual Model.

    Science.gov (United States)

    Varner, Iris I.

    2000-01-01

    Develops a theoretical framework for intercultural business communication which sets it apart from intercultural communication and international business. Presents a model that discusses the intercultural, business, and communication strategies that are part of intercultural business communication. Examines how past articles in the field fit into…

  8. Experimental Tests of Normative Group Influence and Representation Effects in Computer-Mediated Communication: When Interacting Via Computers Differs from Interacting With Computers.

    Science.gov (United States)

    Lee, Eun-Ju; Nass, Clifford

    2002-01-01

    Presents two experiments to address the questions of if and how normative social influence operates in anonymous computer-mediated communication and human-computer interaction. Finds that the perception of interaction partner (human vs. computer) moderated the group conformity effect such that the undergraduate student subjects expressed greater…

  9. Effective Communication Modes in Multilingual Encounters: Comparing Alternatives in Computer Mediated Communication (CMC)

    Science.gov (United States)

    van Mulken, Margot; Hendriks, Berna

    2017-01-01

    This paper reports on an experimental study investigating alternative communication modes to English as a Lingua Franca. The purpose was to examine the effectiveness of different modes of communication and to gain insight in communication strategies used by interlocutors to solve referential conflicts. Findings show that ELF may not necessarily be…

  10. Effective Communication Modes in Multilingual Encounters: Comparing Alternatives in Computer Mediated Communication (CMC)

    Science.gov (United States)

    van Mulken, Margot; Hendriks, Berna

    2017-01-01

    This paper reports on an experimental study investigating alternative communication modes to English as a Lingua Franca. The purpose was to examine the effectiveness of different modes of communication and to gain insight in communication strategies used by interlocutors to solve referential conflicts. Findings show that ELF may not necessarily be…

  11. Dense, Efficient Chip-to-Chip Communication at the Extremes of Computing

    Science.gov (United States)

    Loh, Matthew

    2013-01-01

    The scalability of CMOS technology has driven computation into a diverse range of applications across the power consumption, performance and size spectra. Communication is a necessary adjunct to computation, and whether this is to push data from node-to-node in a high-performance computing cluster or from the receiver of wireless link to a neural…

  12. The Usage of Informal Computer Based Communication in the Context of Organization’s Technological Resources

    Directory of Open Access Journals (Sweden)

    Steponas Jonušauskas

    2011-12-01

    Full Text Available Purpose of the article is theoretically and practically analyze the features of informal computer based communication in the context of organization’s technological resources.Methodology—meta analysis, survey and descriptive analysis.Findings. According to scientists, the functions of informal communication cover sharing of work related information, coordination of team activities, spread of organizational culture and feeling of interdependence and affinity. Also, informal communication widens the individuals’ recognition of reality, creates general context of environment between talkers, and strengthens interpersonal attraction. For these reasons, informal communication is desirable and even necessary in organizations because it helps to ensure efficient functioning of the enterprise. However, communicating through electronic channels suppresses informal connections or addresses them to the outside of the organization. So, electronic communication is not beneficial for developing ties in informal organizational network. The empirical research showed, thatsignificant part of courts administration staff is prone to use technological resources of their office for informal communication. Representatives of courts administration choose friends for computer based communication much more often than colleagues (72% and 63%respectively. 93%of the research respondents use an additional e-mail box serviced by commercial providers for non work communication. High intensity of informal electronic communication with friends and familiars shows that workers of court administration are used to meet their psycho emotional needs outside the work place. The survey confirmed conclusion of the theoretical analysis: computer based communication is not beneficial for developing informal contacts between workers. In order for the informal communication could carry out its functions and technological recourses of organization would be used effectively, staff

  13. The Usage of Informal Computer Based Communication in the Context of Organization’s Technological Resources

    Directory of Open Access Journals (Sweden)

    Agota Giedrė Raišienė

    2013-08-01

    Full Text Available Purpose of the article is theoretically and practically analyze the features of informal computer based communication in the context of organization’s technological resources. Methodology—meta analysis, survey and descriptive analysis. Findings. According to scientists, the functions of informal communication cover sharing of work related information, coordination of team activities, spread of organizational culture and feeling of interdependence and affinity. Also, informal communication widens the individuals’ recognition of reality, creates general context of environment between talkers, and strengthens interpersonal attraction. For these reasons, informal communication is desirable and even necessary in organizations because it helps to ensure efficient functioning of the enterprise. However, communicating through electronic channels suppresses informal connections or addresses them to the outside of the organization. So, electronic communication is not beneficial for developing ties in informal organizational network. The empirical research showed, that significant part of courts administration staff is prone to use technological resources of their office for informal communication. Representatives of courts administration choose friends for computer based communication much more often than colleagues (72% and 63%respectively. 93%of the research respondents use an additional e-mail box serviced by commercial providers for non work communication. High intensity of informal electronic communication with friends and familiars shows that workers of court administration are used to meet their psycho emotional needs outside the work place. The survey confirmed conclusion of the theoretical analysis: computer based communication is not beneficial for developing informal contacts between workers. In order for the informal communication could carry out its functions and technological recourses of organization would be used effectively, staff

  14. Towards the Epidemiological Modeling of Computer Viruses

    Directory of Open Access Journals (Sweden)

    Xiaofan Yang

    2012-01-01

    Full Text Available Epidemic dynamics of computer viruses is an emerging discipline aiming to understand the way that computer viruses spread on networks. This paper is intended to establish a series of rational epidemic models of computer viruses. First, a close inspection of some common characteristics shared by all typical computer viruses clearly reveals the flaws of previous models. Then, a generic epidemic model of viruses, which is named as the SLBS model, is proposed. Finally, diverse generalizations of the SLBS model are suggested. We believe this work opens a door to the full understanding of how computer viruses prevail on the Internet.

  15. Line-plane broadcasting in a data communications network of a parallel computer

    Science.gov (United States)

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-11-23

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  16. Line-plane broadcasting in a data communications network of a parallel computer

    Science.gov (United States)

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-06-08

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  17. Quantum Computation Beyond the Circuit Model

    OpenAIRE

    Jordan, Stephen P.

    2008-01-01

    The quantum circuit model is the most widely used model of quantum computation. It provides both a framework for formulating quantum algorithms and an architecture for the physical construction of quantum computers. However, several other models of quantum computation exist which provide useful alternative frameworks for both discovering new quantum algorithms and devising new physical implementations of quantum computers. In this thesis, I first present necessary background material for a ge...

  18. Understanding the requirements imposed by programming model middleware on a common communication subsystem.

    Energy Technology Data Exchange (ETDEWEB)

    Buntinas, D.; Gropp, W.

    2005-12-13

    In high-performance parallel computing, most programming-model middleware libraries and runtime systems use a communication subsystem to abstract the lower-level network layer. The functionality required of a communication subsystem depends largely on the programming model implemented by the middleware. In order to maximize performance, middleware libraries and runtime systems typically implement their own communication subsystems that are specially tuned for the middleware, rather than use an existing communication subsystem. This situation leads to duplicated effort and prevents different middleware libraries from being used by the same application in hybrid programming models. In this paper we describe features required by various middleware libraries as well as some desirable features that would make it easier to port a middleware library to the communication subsystem and allow the middleware to make use of high-performance features provided by some networking layers. We show that none of the communication subsystems that we evaluate support all of the features.

  19. Using a computer simulation for teaching communication skills: A blinded multisite mixed methods randomized controlled trial.

    Science.gov (United States)

    Kron, Frederick W; Fetters, Michael D; Scerbo, Mark W; White, Casey B; Lypson, Monica L; Padilla, Miguel A; Gliva-McConvey, Gayle A; Belfore, Lee A; West, Temple; Wallace, Amelia M; Guetterman, Timothy C; Schleicher, Lauren S; Kennedy, Rebecca A; Mangrulkar, Rajesh S; Cleary, James F; Marsella, Stacy C; Becker, Daniel M

    2017-04-01

    To assess advanced communication skills among second-year medical students exposed either to a computer simulation (MPathic-VR) featuring virtual humans, or to a multimedia computer-based learning module, and to understand each group's experiences and learning preferences. A single-blinded, mixed methods, randomized, multisite trial compared MPathic-VR (N=210) to computer-based learning (N=211). Primary outcomes: communication scores during repeat interactions with MPathic-VR's intercultural and interprofessional communication scenarios and scores on a subsequent advanced communication skills objective structured clinical examination (OSCE). Multivariate analysis of variance was used to compare outcomes. student attitude surveys and qualitative assessments of their experiences with MPathic-VR or computer-based learning. MPathic-VR-trained students improved their intercultural and interprofessional communication performance between their first and second interactions with each scenario. They also achieved significantly higher composite scores on the OSCE than computer-based learning-trained students. Attitudes and experiences were more positive among students trained with MPathic-VR, who valued its providing immediate feedback, teaching nonverbal communication skills, and preparing them for emotion-charged patient encounters. MPathic-VR was effective in training advanced communication skills and in enabling knowledge transfer into a more realistic clinical situation. MPathic-VR's virtual human simulation offers an effective and engaging means of advanced communication training. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  20. Lunar Pole Illumination and Communications Maps Computed from GSSR Elevation Data

    Science.gov (United States)

    Bryant, Scott

    2009-01-01

    A Digital Elevation Model of the lunar south pole was produced using Goldstone Solar System RADAR (GSSR) data obtained in 2006.12 This model has 40-meter horizontal resolution and about 5-meter relative vertical accuracy. This Digital Elevation Model was used to compute average solar illumination and Earth visibility with 100 kilometers of the lunar south pole. The elevation data were converted into local terrain horizon masks, then converted into lunar-centric latitude and longitude coordinates. The horizon masks were compared to latitude, longitude regions bounding the maximum Sun and Earth motions relative to the moon. Estimates of Earth visibility were computed by integrating the area of the region bounding the Earth's motion that was below the horizon mask. Solar illumination and other metrics were computed similarly. Proposed lunar south pole base sites were examined in detail, with the best site showing yearly solar power availability of 92 percent and Direct-To-Earth (DTE) communication availability of about 50 percent. Similar analysis of the lunar south pole used an older GSSR Digital Elevation Model with 600-meter horizontal resolution. The paper also explores using a heliostat to reduce the photovoltaic power system mass and complexity.

  1. Lunar Pole Illumination and Communications Maps Computed from GSSR Elevation Data

    Science.gov (United States)

    Bryant, Scott

    2009-01-01

    A Digital Elevation Model of the lunar south pole was produced using Goldstone Solar System RADAR (GSSR) data obtained in 2006.12 This model has 40-meter horizontal resolution and about 5-meter relative vertical accuracy. This Digital Elevation Model was used to compute average solar illumination and Earth visibility with 100 kilometers of the lunar south pole. The elevation data were converted into local terrain horizon masks, then converted into lunar-centric latitude and longitude coordinates. The horizon masks were compared to latitude, longitude regions bounding the maximum Sun and Earth motions relative to the moon. Estimates of Earth visibility were computed by integrating the area of the region bounding the Earth's motion that was below the horizon mask. Solar illumination and other metrics were computed similarly. Proposed lunar south pole base sites were examined in detail, with the best site showing yearly solar power availability of 92 percent and Direct-To-Earth (DTE) communication availability of about 50 percent. Similar analysis of the lunar south pole used an older GSSR Digital Elevation Model with 600-meter horizontal resolution. The paper also explores using a heliostat to reduce the photovoltaic power system mass and complexity.

  2. Data communications for a collective operation in a parallel active messaging interface of a parallel computer

    Energy Technology Data Exchange (ETDEWEB)

    Faraj, Daniel A.

    2015-11-19

    Algorithm selection for data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including specifications of a client, a context, and a task, endpoints coupled for data communications through the PAMI, including associating in the PAMI data communications algorithms and bit masks; receiving in an origin endpoint of the PAMI a collective instruction, the instruction specifying transmission of a data communications message from the origin endpoint to a target endpoint; constructing a bit mask for the received collective instruction; selecting, from among the associated algorithms and bit masks, a data communications algorithm in dependence upon the constructed bit mask; and executing the collective instruction, transmitting, according to the selected data communications algorithm from the origin endpoint to the target endpoint, the data communications message.

  3. Data communications for a collective operation in a parallel active messaging interface of a parallel computer

    Science.gov (United States)

    Faraj, Daniel A

    2013-07-16

    Algorithm selection for data communications in a parallel active messaging interface (`PAMI`) of a parallel computer, the PAMI composed of data communications endpoints, each endpoint including specifications of a client, a context, and a task, endpoints coupled for data communications through the PAMI, including associating in the PAMI data communications algorithms and bit masks; receiving in an origin endpoint of the PAMI a collective instruction, the instruction specifying transmission of a data communications message from the origin endpoint to a target endpoint; constructing a bit mask for the received collective instruction; selecting, from among the associated algorithms and bit masks, a data communications algorithm in dependence upon the constructed bit mask; and executing the collective instruction, transmitting, according to the selected data communications algorithm from the origin endpoint to the target endpoint, the data communications message.

  4. Computational modeling of epithelial tissues.

    Science.gov (United States)

    Smallwood, Rod

    2009-01-01

    There is an extensive literature on the computational modeling of epithelial tissues at all levels from subcellular to whole tissue. This review concentrates on behavior at the individual cell to whole tissue level, and particularly on organizational aspects, and provides an indication of where information from other areas, such as the modeling of angiogenesis, is relevant. The skin, and the lining of all of the body cavities (lung, gut, cervix, bladder etc) are epithelial tissues, which in a topological sense are the boundary between inside and outside the body. They are thin sheets of cells (usually of the order of 0.5 mm thick) without extracellular matrix, have a relatively simple structure, and contain few types of cells. They have important barrier, secretory and transport functions, which are essential for the maintenance of life, so homeostasis and wound healing are important aspects of the behavior of epithelial tissues. Carcinomas originate in epithelial tissues.There are essentially two approaches to modeling tissues--to start at the level of the tissue (i.e., a length scale of the order of 1 mm) and develop generalized equations for behavior (a continuum approach); or to start at the level of the cell (i.e., a length scale of the order of 10 µm) and develop tissue behavior as an emergent property of cellular behavior (an individual-based approach). As will be seen, these are not mutually exclusive approaches, and they come in a variety of flavors.

  5. Linguistics Computation, Automatic Model Generation, and Intensions

    CERN Document Server

    Nourani, C F

    1994-01-01

    Techniques are presented for defining models of computational linguistics theories. The methods of generalized diagrams that were developed by this author for modeling artificial intelligence planning and reasoning are shown to be applicable to models of computation of linguistics theories. It is shown that for extensional and intensional interpretations, models can be generated automatically which assign meaning to computations of linguistics theories for natural languages. Keywords: Computational Linguistics, Reasoning Models, G-diagrams For Models, Dynamic Model Implementation, Linguistics and Logics For Artificial Intelligence

  6. Model dynamics for quantum computing

    Science.gov (United States)

    Tabakin, Frank

    2017-08-01

    A model master equation suitable for quantum computing dynamics is presented. In an ideal quantum computer (QC), a system of qubits evolves in time unitarily and, by virtue of their entanglement, interfere quantum mechanically to solve otherwise intractable problems. In the real situation, a QC is subject to decoherence and attenuation effects due to interaction with an environment and with possible short-term random disturbances and gate deficiencies. The stability of a QC under such attacks is a key issue for the development of realistic devices. We assume that the influence of the environment can be incorporated by a master equation that includes unitary evolution with gates, supplemented by a Lindblad term. Lindblad operators of various types are explored; namely, steady, pulsed, gate friction, and measurement operators. In the master equation, we use the Lindblad term to describe short time intrusions by random Lindblad pulses. The phenomenological master equation is then extended to include a nonlinear Beretta term that describes the evolution of a closed system with increasing entropy. An external Bath environment is stipulated by a fixed temperature in two different ways. Here we explore the case of a simple one-qubit system in preparation for generalization to multi-qubit, qutrit and hybrid qubit-qutrit systems. This model master equation can be used to test the stability of memory and the efficacy of quantum gates. The properties of such hybrid master equations are explored, with emphasis on the role of thermal equilibrium and entropy constraints. Several significant properties of time-dependent qubit evolution are revealed by this simple study.

  7. A platform independent communication library for distributed computing

    NARCIS (Netherlands)

    Groen, D.; Rieder, S.; Grosso, P.; de Laat, C.; Portegies Zwart, S.

    2010-01-01

    We present MPWide, a platform independent communication library for performing message passing between supercomputers. Our library couples several local MPI applications through a long distance network using, for example, optical links. The implementation is deliberately kept light-weight, platform

  8. A case study on support for students' thinking through computer-mediated communication.

    Science.gov (United States)

    Sannomiya, M; Kawaguchi, A

    2000-08-01

    This is a case study on support for thinking through computer-mediated communication. Two graduate students were supervised in their research using computer-mediated communication, which was asynchronous and written; the supervisor was not present. The students' reports pointed out there was more planning and editing and low interactivity in this approach relative to face-to-face communication. These attributes were confirmed by their supervisor's report. The students also suggested that the latter was effective in support of a production stage of thinking in research, while the former approach was effective in support of examination of thinking. For distance education to be successful, an appropriate combination of communication media must consider students' thinking stages. Finally, transient and permanent effects should be discriminated in computer-mediated communication.

  9. Mass and power modeling of communication satellites

    Science.gov (United States)

    Price, Kent M.; Pidgeon, David; Tsao, Alex

    1991-01-01

    Analytic estimating relationships for the mass and power requirements for major satellite subsystems are described. The model for each subsystem is keyed to the performance drivers and system requirements that influence their selection and use. Guidelines are also given for choosing among alternative technologies which accounts for other significant variables such as cost, risk, schedule, operations, heritage, and life requirements. These models are intended for application to first order systems analyses, where resources do not warrant detailed development of a communications system scenario. Given this ground rule, the models are simplified to 'smoothed' representation of reality. Therefore, the user is cautioned that cost, schedule, and risk may be significantly impacted where interpolations are sufficiently different from existing hardware as to warrant development of new devices.

  10. Computational modeling of membrane proteins.

    Science.gov (United States)

    Koehler Leman, Julia; Ulmschneider, Martin B; Gray, Jeffrey J

    2015-01-01

    The determination of membrane protein (MP) structures has always trailed that of soluble proteins due to difficulties in their overexpression, reconstitution into membrane mimetics, and subsequent structure determination. The percentage of MP structures in the protein databank (PDB) has been at a constant 1-2% for the last decade. In contrast, over half of all drugs target MPs, only highlighting how little we understand about drug-specific effects in the human body. To reduce this gap, researchers have attempted to predict structural features of MPs even before the first structure was experimentally elucidated. In this review, we present current computational methods to predict MP structure, starting with secondary structure prediction, prediction of trans-membrane spans, and topology. Even though these methods generate reliable predictions, challenges such as predicting kinks or precise beginnings and ends of secondary structure elements are still waiting to be addressed. We describe recent developments in the prediction of 3D structures of both α-helical MPs as well as β-barrels using comparative modeling techniques, de novo methods, and molecular dynamics (MD) simulations. The increase of MP structures has (1) facilitated comparative modeling due to availability of more and better templates, and (2) improved the statistics for knowledge-based scoring functions. Moreover, de novo methods have benefited from the use of correlated mutations as restraints. Finally, we outline current advances that will likely shape the field in the forthcoming decade.

  11. FY 1998 Blue Book: Computing, Information, and Communications: Technologies for the 21st Century

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — As the 21st century approaches, the rapid convergence of computing, communications, and information technology promises unprecedented opportunities for scientific...

  12. Creating and Using Interactive Computer Quizzes to Develop Business Communication Skills.

    Science.gov (United States)

    Hildebrand, Janet E.

    1993-01-01

    Describes interactive computer quizzes on international business developed by the Center for Productive Communication at Texas Christian University's M.J. Neeley School of Business. Explains how to produce quizzes for classroom use. (RS)

  13. FY 2000 Blue Book: High Performance Computing and Communications: Information Technology Frontiers for a New Millennium

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — As we near the dawn of a new millennium, advances made possible by computing, information, and communications research and development R and D ? once barely...

  14. FY 1996 Blue Book: High Performance Computing and Communications: Foundations for America`s Information Future

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Federal High Performance Computing and Communications HPCC Program will celebrate its fifth anniversary in October 1996 with an impressive array of...

  15. FY 1997 Blue Book: High Performance Computing and Communications: Advancing the Frontiers of Information Technology

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Federal High Performance Computing and Communications HPCC Program will celebrate its fifth anniversary in October 1996 with an impressive array of...

  16. 77 FR 65580 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers...

    Science.gov (United States)

    2012-10-29

    ... From the Federal Register Online via the Government Publishing Office ] INTERNATIONAL TRADE COMMISSION Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers, and Components Thereof AGENCY: U.S. International Trade Commission. ACTION: Notice. SUMMARY: Notice is...

  17. Cupola Furnace Computer Process Model

    Energy Technology Data Exchange (ETDEWEB)

    Seymour Katz

    2004-12-31

    The cupola furnace generates more than 50% of the liquid iron used to produce the 9+ million tons of castings annually. The cupola converts iron and steel into cast iron. The main advantages of the cupola furnace are lower energy costs than those of competing furnaces (electric) and the ability to melt less expensive metallic scrap than the competing furnaces. However the chemical and physical processes that take place in the cupola furnace are highly complex making it difficult to operate the furnace in optimal fashion. The results are low energy efficiency and poor recovery of important and expensive alloy elements due to oxidation. Between 1990 and 2004 under the auspices of the Department of Energy, the American Foundry Society and General Motors Corp. a computer simulation of the cupola furnace was developed that accurately describes the complex behavior of the furnace. When provided with the furnace input conditions the model provides accurate values of the output conditions in a matter of seconds. It also provides key diagnostics. Using clues from the diagnostics a trained specialist can infer changes in the operation that will move the system toward higher efficiency. Repeating the process in an iterative fashion leads to near optimum operating conditions with just a few iterations. More advanced uses of the program have been examined. The program is currently being combined with an ''Expert System'' to permit optimization in real time. The program has been combined with ''neural network'' programs to affect very easy scanning of a wide range of furnace operation. Rudimentary efforts were successfully made to operate the furnace using a computer. References to these more advanced systems will be found in the ''Cupola Handbook''. Chapter 27, American Foundry Society, Des Plaines, IL (1999).

  18. The Usage of Informal Computer Based Communication in the Context of Organization’s Technological Resources

    OpenAIRE

    Steponas Jonušauskas; Agota Giedrė Raišienė

    2011-01-01

    Purpose of the article is theoretically and practically analyze the features of informal computer based communication in the context of organization’s technological resources. Methodology—meta analysis, survey and descriptive analysis. Findings. According to scientists, the functions of informal communication cover sharing of work related information, coordination of team activities, spread of organizational culture and feeling of interdependence and affinity. Also, informal communication wid...

  19. Disciplines, models, and computers: the path to computational quantum chemistry.

    Science.gov (United States)

    Lenhard, Johannes

    2014-12-01

    Many disciplines and scientific fields have undergone a computational turn in the past several decades. This paper analyzes this sort of turn by investigating the case of computational quantum chemistry. The main claim is that the transformation from quantum to computational quantum chemistry involved changes in three dimensions. First, on the side of instrumentation, small computers and a networked infrastructure took over the lead from centralized mainframe architecture. Second, a new conception of computational modeling became feasible and assumed a crucial role. And third, the field of computa- tional quantum chemistry became organized in a market-like fashion and this market is much bigger than the number of quantum theory experts. These claims will be substantiated by an investigation of the so-called density functional theory (DFT), the arguably pivotal theory in the turn to computational quantum chemistry around 1990.

  20. Computational biomechanics for medicine imaging, modeling and computing

    CERN Document Server

    Doyle, Barry; Wittek, Adam; Nielsen, Poul; Miller, Karol

    2016-01-01

    The Computational Biomechanics for Medicine titles provide an opportunity for specialists in computational biomechanics to present their latest methodologies and advancements. This volume comprises eighteen of the newest approaches and applications of computational biomechanics, from researchers in Australia, New Zealand, USA, UK, Switzerland, Scotland, France and Russia. Some of the interesting topics discussed are: tailored computational models; traumatic brain injury; soft-tissue mechanics; medical image analysis; and clinically-relevant simulations. One of the greatest challenges facing the computational engineering community is to extend the success of computational mechanics to fields outside traditional engineering, in particular to biology, the biomedical sciences, and medicine. We hope the research presented within this book series will contribute to overcoming this grand challenge.

  1. A study of computer graphics technology in application of communication resource management

    Science.gov (United States)

    Li, Jing; Zhou, Liang; Yang, Fei

    2017-08-01

    With the development of computer technology, computer graphics technology has been widely used. Especially, the success of object-oriented technology and multimedia technology promotes the development of graphics technology in the computer software system. Therefore, the computer graphics theory and application technology have become an important topic in the field of computer, while the computer graphics technology becomes more and more extensive in various fields of application. In recent years, with the development of social economy, especially the rapid development of information technology, the traditional way of communication resource management cannot effectively meet the needs of resource management. In this case, the current communication resource management is still using the original management tools and management methods, resource management equipment management and maintenance, which brought a lot of problems. It is very difficult for non-professionals to understand the equipment and the situation in communication resource management. Resource utilization is relatively low, and managers cannot quickly and accurately understand the resource conditions. Aimed at the above problems, this paper proposes to introduce computer graphics technology into the communication resource management. The introduction of computer graphics not only makes communication resource management more vivid, but also reduces the cost of resource management and improves work efficiency.

  2. Establishing Goals and Maintaining Coherence in Multiparty Computer-Mediated Communication

    Science.gov (United States)

    Groen, Martin; Noyes, Jan

    2013-01-01

    Communicating via text-only computer-mediated communication (CMC) channels is associated with a number of issues that would impair users in achieving dialogue coherence and goals. It has been suggested that humans have devised novel adaptive strategies to deal with those issues. However, it could be that humans rely on "classic"…

  3. User-computer interfaces for scientific communication: the concept of habitable interfaces

    NARCIS (Netherlands)

    Malchanau, Andrei

    2004-01-01

    Developments in computer technology have changed the way we communicate in general and in science in particular. These developments enable the increase in the effectiveness and efficiency of the communication. The actual increase will depend also on the fit between technology and people who are comm

  4. Play It Again with Feeling: Computer Feedback in Musical Communication of Emotions

    Science.gov (United States)

    Juslin, Patrik N.; Karlsson, Jessika; Lindstrom, Erik; Friberg, Anders; Schoonderwaldt, Erwin

    2006-01-01

    Communication of emotions is of crucial importance in music performance. Yet research has suggested that this skill is neglected in music education. This article presents and evaluates a computer program that automatically analyzes music performances and provides feedback to musicians in order to enhance their communication of emotions. Thirty-six…

  5. Communication between the right and circumflex coronary arteries discovered incidentally by multidetector computed tomography

    Energy Technology Data Exchange (ETDEWEB)

    Kwon, Se Hwan; Kim, Eui Jong; Woo, Jong Shin; Kim, Soo Joong; Youn, Hyo Chul; Oh, Joo Hyeong [College of Medicine, Kyung Hee University, Seoul (Korea, Republic of)

    2016-09-15

    Intercoronary communication is a rare congenital coronary anomaly. We present a case of a 48-year-old man with an incidentally discovered communication between the right and circumflex coronary arteries, who was admitted with chest tightness and exertional dyspnea. The initial diagnosis was made using electrocardiogram-gated multidetector computed tomography.

  6. Written and Computer-Mediated Accounting Communication Skills: An Employer Perspective

    Science.gov (United States)

    Jones, Christopher G.

    2011-01-01

    Communication skills are a fundamental personal competency for a successful career in accounting. What is not so obvious is the specific written communication skill set employers look for and the extent those skills are computer mediated. Using survey research, this article explores the particular skills employers desire and their satisfaction…

  7. An experimental test of processes underlying self-disclosure in computer-mediated communication

    NARCIS (Netherlands)

    Schouten, A.P.; Valkenburg, P.M.; Peter, J.

    2009-01-01

    A consistent finding in computer-mediated communication (CMC) and Internet research is that, compared to face-toface communication, CMC results in higher levels of self-disclosure. We identified four possible mediators that may carry the influence of CMC on self-disclosure: self-presentation,

  8. Play It Again with Feeling: Computer Feedback in Musical Communication of Emotions

    Science.gov (United States)

    Juslin, Patrik N.; Karlsson, Jessika; Lindstrom, Erik; Friberg, Anders; Schoonderwaldt, Erwin

    2006-01-01

    Communication of emotions is of crucial importance in music performance. Yet research has suggested that this skill is neglected in music education. This article presents and evaluates a computer program that automatically analyzes music performances and provides feedback to musicians in order to enhance their communication of emotions. Thirty-six…

  9. An Instructional Paradigm for the Teaching of Computer-Mediated Communication

    Science.gov (United States)

    Howard, Craig D.

    2012-01-01

    This article outlines an instructional paradigm that guides the design of interventions that build skills in computer-mediated communication (CMC). It is applicable to learning at multiple levels of communicative proficiency and aims to heighten awareness, the understanding of the impact of media configurations, the role of cultures and social…

  10. Learning Opportunities in Synchronous Computer-Mediated Communication and Face-to-Face Interaction

    Science.gov (United States)

    Kim, Hye Yeong

    2014-01-01

    This study investigated how synchronous computer-mediated communication (SCMC) and face-to-face (F2F) oral interaction influence the way in which learners collaborate in language learning and how they solve their communicative problems. The findings suggest that output modality may affect how learners produce language, attend to linguistic forms,…

  11. Written and Computer-Mediated Accounting Communication Skills: An Employer Perspective

    Science.gov (United States)

    Jones, Christopher G.

    2011-01-01

    Communication skills are a fundamental personal competency for a successful career in accounting. What is not so obvious is the specific written communication skill set employers look for and the extent those skills are computer mediated. Using survey research, this article explores the particular skills employers desire and their satisfaction…

  12. Computer-Mediated Communication with Distant Friends: Relations with Adjustment during Students' First Semester in College

    Science.gov (United States)

    Ranney, John D.; Troop-Gordon, Wendy

    2012-01-01

    Because of recent technological innovations, college freshmen can readily communicate with friends who they see infrequently (e.g., friends from home). The current study addressed whether computer-mediated communication with these distant friends can compensate for a lack of high-quality on-campus friendships during students' first semester of…

  13. Computer-Supported Instructional Communication: A Multidisciplinary Account of Relevant Factors

    Science.gov (United States)

    Rummel, Nikol; Kramer, Nicole

    2010-01-01

    The papers in the present special issue summarize research that aims at compiling and understanding variables associated with successful communication in computer-supported instructional settings. Secondly, the papers add to the question of how adaptiveness of instructional communication may be achieved. A particular strength of the special issue…

  14. LogGPO: An accurate communication model for performance prediction of MPI programs

    Institute of Scientific and Technical Information of China (English)

    CHEN WenGuang; ZHAI JiDong; ZHANG Jin; ZHENG WeiMin

    2009-01-01

    Message passing interface (MPI) is the de facto standard in writing parallel scientific applications on distributed memory systems. Performance prediction of MPI programs on current or future parallel sys-terns can help to find system bottleneck or optimize programs. To effectively analyze and predict per-formance of a large and complex MPI program, an efficient and accurate communication model is highly needed. A series of communication models have been proposed, such as the LogP model family, which assume that the sending overhead, message transmission, and receiving overhead of a communication is not overlapped and there is a maximum overlap degree between computation and communication. However, this assumption does not always hold for MPI programs because either sending or receiving overhead introduced by MPI implementations can decrease potential overlap for large messages. In this paper, we present a new communication model, named LogGPO, which captures the potential overlap between computation with communication of MPI programs. We design and implement a trace-driven simulator to verify the LogGPO model by predicting performance of point-to-point communication and two real applications CG and Sweep3D. The average prediction errors of LogGPO model are 2.4% and 2.0% for these two applications respectively, while the average prediction errors of LogGP model are 38.3% and 9.1% respectively.

  15. 3rd International Conference on "Emerging Research in Computing, Information, Communication and Applications"

    CERN Document Server

    Prasad, NH; Nalini, N

    2015-01-01

    This proceedings volume covers the proceedings of ERCICA 2015. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of  Computing, Information, Communication and their Applications. The contents of this book cover emerging research areas in fields of Computing, Information, Communication and Applications. This will prove useful to both researchers and practicing engineers.

  16. Reviewing the Model of Communicative Competence in English Teaching

    Institute of Scientific and Technical Information of China (English)

    杨丽冬; 吴叶明

    2013-01-01

    English communicative competence is growingly important, however, many college graduates can’t communicate smoothly in English. Therefore, the English teacher is supposed to know clearly what abilities English communicative compe⁃tence should contain, namely: what ability a person needs to be able to use English to communicate effectively. To that end, a large number of relevant literatures is carefully read;the evolution of English communicative competence model is reviewed;and then an English communicative competence model, inclusive, open-ended and dynamic, is put forward to guide English teach⁃ing and learning.

  17. Computer-mediated communication: task performance and satisfaction.

    Science.gov (United States)

    Simon, Andrew F

    2006-06-01

    The author assessed satisfaction and performance on 3 tasks (idea generation, intellective, judgment) among 75 dyads (N = 150) working through 1 of 3 modes of communication (instant messaging, videoconferencing, face to face). The author based predictions on the Media Naturalness Theory (N. Kock, 2001, 2002) and on findings from past researchers (e.g., D. M. DeRosa, C. Smith, & D. A. Hantula, in press) of the interaction between tasks and media. The present author did not identify task performance differences, although satisfaction with the medium was lower among those dyads communicating through an instant-messaging system than among those interacting face to face or through videoconferencing. The findings support the Media Naturalness Theory. The author discussed them in relation to the participants' frequent use of instant messaging and their familiarity with new communication media.

  18. A secure communications infrastructure for high-performance distributed computing

    Energy Technology Data Exchange (ETDEWEB)

    Foster, I.; Koenig, G.; Tuecke, S. [and others

    1997-08-01

    Applications that use high-speed networks to connect geographically distributed supercomputers, databases, and scientific instruments may operate over open networks and access valuable resources. Hence, they can require mechanisms for ensuring integrity and confidentially of communications and for authenticating both users and resources. Security solutions developed for traditional client-server applications do not provide direct support for the program structures, programming tools, and performance requirements encountered in these applications. The authors address these requirements via a security-enhanced version of the Nexus communication library; which they use to provide secure versions of parallel libraries and languages, including the Message Passing Interface. These tools permit a fine degree of control over what, where, and when security mechanisms are applied. In particular, a single application can mix secure and nonsecure communication, allowing the programmer to make fine-grained security/performance tradeoffs. The authors present performance results that quantify the performance of their infrastructure.

  19. Computational Modelling in Cancer: Methods and Applications

    Directory of Open Access Journals (Sweden)

    Konstantina Kourou

    2015-01-01

    Full Text Available Computational modelling of diseases is an emerging field, proven valuable for the diagnosis, prognosis and treatment of the disease. Cancer is one of the diseases where computational modelling provides enormous advancements, allowing the medical professionals to perform in silico experiments and gain insights prior to any in vivo procedure. In this paper, we review the most recent computational models that have been proposed for cancer. Well known databases used for computational modelling experiments, as well as, the various markup language representations are discussed. In addition, recent state of the art research studies related to tumour growth and angiogenesis modelling are presented.

  20. Dynamic Distribution Model with Prime Granularity for Parallel Computing

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Dynamic distribution model is one of the best schemes for parallel volume rendering. However, in homogeneous cluster system, since the granularity is traditionally identical, all processors communicate almost simultaneously and computation load may lose balance. Due to problems above, a dynamic distribution model with prime granularity for parallel computing is presented.Granularities of each processor are relatively prime, and related theories are introduced. A high parallel performance can be achieved by minimizing network competition and using a load balancing strategy that ensures all processors finish almost simultaneously. Based on Master-Slave-Gleaner (MSG) scheme, the parallel Splatting Algorithm for volume rendering is used to test the model on IBM Cluster 1350 system. The experimental results show that the model can bring a considerable improvement in performance, including computation efficiency, total execution time, speed, and load balancing.

  1. Estimation Techniques for Monitoring and Controlling the Performance of the Computer Communication Networks

    Directory of Open Access Journals (Sweden)

    Ibrahiem M.M. El Emary

    2005-01-01

    Full Text Available This study was concerned with making a comparative study between four types of time series model with the goal of choosing the optimum one to predict the performance of a computer communication network. The investigated four types of time series are: Least Square (LS, Fourier series, Exponential Weighted Moving Average (EWMA and the Auto Regressive Integrated Moving Average (ARIMA. Comparative study is based on comparing some of statistical measurement for these four time series models as: mean standard deviation and variance. We apply these various types of time series on two types of network to predict their performance; the first one is called token bus while the second one is called the token ring. Concluded results prove that both EWMA and ARIMA perform better than the others LS and Fourier since both EWMA and ARIMA forecast the network performance parameters with an accuracy of 98% near the actual values.

  2. Basic definitions for discrete modeling of computer worms epidemics

    Directory of Open Access Journals (Sweden)

    P. Guevara

    2015-04-01

    Full Text Available The information technologies have evolved in such a way that communication between computers or hosts has become common, so much that the worldwide organization (governments and corporations depends on it; what could happen if these computers stop working for a long time is catastrophic. Unfortunately, networks are attacked by malware such as viruses and worms that could collapse the system. This has served as motivation for the formal study of computer worms and epidemics to develop strategies for prevention and protection; this is why in this paper, before analyzing epidemiological models, a set of formal definitions based on set theory and functions is proposed for describing 21 concepts used in the study of worms. These definitions provide a basis for future qualitative research on the behavior of computer worms, and quantitative for the study of their epidemiological models.

  3. Modeling, analysis and optimization of network-on-chip communication architectures

    CERN Document Server

    Ogras, Umit Y

    2013-01-01

    Traditionally, design space exploration for Systems-on-Chip (SoCs) has focused on the computational aspects of the problem at hand. However, as the number of components on a single chip and their performance continue to increase, the communication architecture plays a major role in the area, performance and energy consumption of the overall system. As a result, a shift from computation-based to communication-based design becomes mandatory. Towards this end, network-on-chip (NoC) communication architectures have emerged recently as a promising alternative to classical bus and point-to-point communication architectures. This book explores outstanding research problems related to modeling, analysis and optimization of NoC communication architectures. More precisely, we present novel design methodologies, software tools and FPGA prototypes to aid the design of application-specific NoCs.

  4. The Transformation of Scientific Communication: A Model for 2020.

    Science.gov (United States)

    Hurd, Julie M.

    2000-01-01

    Information technologies, particularly the personal computer and the World Wide Web, are changing the ways that scientists communicate. This article offers a new paradigm for communication in science, and suggests how digital media might bring new roles and functionalities to participants. The argument is made that behavioral and organizational…

  5. Computational Models for Nonlinear Aeroelastic Systems Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Clear Science Corp. and Duke University propose to develop and demonstrate new and efficient computational methods of modeling nonlinear aeroelastic systems. The...

  6. Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems

    Science.gov (United States)

    Martins, Goncalo; Moondra, Arul; Dubey, Abhishek; Bhattacharjee, Anirban; Koutsoukos, Xenofon D.

    2016-01-01

    In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms enabling the exchange of precise and synchronous messages. TT systems have computation and communication constraints, and with the aim to enable secure communications in the network, it is important to evaluate the computational and communication overhead of implementing secure communication mechanisms. This paper presents a comprehensive analysis and evaluation of the effects of adding a Hash-based Message Authentication (HMAC) to TT networked control systems. The contributions of the paper include (1) the analysis and experimental validation of the communication overhead, as well as a scalability analysis that utilizes the experimental result for both wired and wireless platforms and (2) an experimental evaluation of the computational overhead of HMAC based on a kernel-level Linux implementation. An automotive application is used as an example, and the results show that it is feasible to implement a secure communication mechanism without interfering with the existing automotive controller execution times. The methods and results of the paper can be used for evaluating the performance impact of security mechanisms and, thus, for the design of secure wired and wireless TT networked control systems. PMID:27463718

  7. Computation and Communication Evaluation of an Authentication Mechanism for Time-Triggered Networked Control Systems.

    Science.gov (United States)

    Martins, Goncalo; Moondra, Arul; Dubey, Abhishek; Bhattacharjee, Anirban; Koutsoukos, Xenofon D

    2016-07-25

    In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms enabling the exchange of precise and synchronous messages. TT systems have computation and communication constraints, and with the aim to enable secure communications in the network, it is important to evaluate the computational and communication overhead of implementing secure communication mechanisms. This paper presents a comprehensive analysis and evaluation of the effects of adding a Hash-based Message Authentication (HMAC) to TT networked control systems. The contributions of the paper include (1) the analysis and experimental validation of the communication overhead, as well as a scalability analysis that utilizes the experimental result for both wired and wireless platforms and (2) an experimental evaluation of the computational overhead of HMAC based on a kernel-level Linux implementation. An automotive application is used as an example, and the results show that it is feasible to implement a secure communication mechanism without interfering with the existing automotive controller execution times. The methods and results of the paper can be used for evaluating the performance impact of security mechanisms and, thus, for the design of secure wired and wireless TT networked control systems.

  8. Model of computation for Fourier optical processors

    Science.gov (United States)

    Naughton, Thomas J.

    2000-05-01

    We present a novel and simple theoretical model of computation that captures what we believe are the most important characteristics of an optical Fourier transform processor. We use this abstract model to reason about the computational properties of the physical systems it describes. We define a grammar for our model's instruction language, and use it to write algorithms for well-known filtering and correlation techniques. We also suggest suitable computational complexity measures that could be used to analyze any coherent optical information processing technique, described with the language, for efficiency. Our choice of instruction language allows us to argue that algorithms describable with this model should have optical implementations that do not require a digital electronic computer to act as a master unit. Through simulation of a well known model of computation from computer theory we investigate the general-purpose capabilities of analog optical processors.

  9. On the Boundaries of Trust and Security in Computing and Communications Systems

    CERN Document Server

    Pathan, Al-Sakib Khan

    2012-01-01

    This article analyzes trust and security in computing and communications systems. While in human-life, trust usually has some kind of commonly understood meaning, in the realm of computing and communications systems, it could be interpreted differently in different environments and settings. On the other hand, security is about making sure that the participating entities are legitimate in a communication event or incident so that the core requirements of privacy, integrity, and authenticity are maintained. This notion is also true for our human life, even for example entering a house needs legitimacy of a person. Some boundary lines preserve the security; otherwise an unwanted access is called a 'security breach'. The intent of this article is to compare and discuss these two terms with our societal behavior and understanding amongst entities. To illustrate these issues especially in computing and communications world, some of the innovating and recent technologies are discussed which demand trust and securit...

  10. Managing Impression Formation in Computer-Mediated Communication.

    Science.gov (United States)

    Liu, Yuliang; Ginther, Dean

    2001-01-01

    Offers suggestions for online instructors regarding verbal and nonverbal impression management. The recommendations should facilitate computer mediated teacher-student or manager-client interactions and help develop constructive relationships that promote learning and productivity. (EV)

  11. Fluid Centrality: A Social Network Analysis of Social-Technical Relations in Computer-Mediated Communication

    Science.gov (United States)

    Enriquez, Judith Guevarra

    2010-01-01

    In this article, centrality is explored as a measure of computer-mediated communication (CMC) in networked learning. Centrality measure is quite common in performing social network analysis (SNA) and in analysing social cohesion, strength of ties and influence in CMC, and computer-supported collaborative learning research. It argues that measuring…

  12. Computer Communications Problems: How to Teach Your Students to Overcome Them.

    Science.gov (United States)

    Riedl, Richard

    1986-01-01

    Stresses the importance of teaching the skills necessary for students to understand computer communications, including microcomputer and remote computer commands; how to get information from human resources through a bulletin board service or information utility; and keyword searching and Boolean logic. (EM)

  13. Natural Communication with Computers III. Final Report, 31 August 1969 Through 30 September 1970.

    Science.gov (United States)

    Bobrow, Daniel G.

    Research was undertaken to develop techniques to facilitate natural communication with computers, people, other computers, and real-time devices. The work has been carried on as an integrated research program; work on semantic automatic language processing and automatic programing aids was performed, and work on the development of time-sharing…

  14. A Literature Review of Computers and Pedagogy for Journalism and Mass Communication Education.

    Science.gov (United States)

    Hoag, Anne M.; Bhattacharya, Sandhya; Helsel, Jeffrey; Hu, Yifeng; Lee, Sangki; Kim, Jinhee; Kim, Sunghae; Michael, Patty Wharton; Park, Chongdae; Sager, Sheila S.; Seo, Sangho; Stark, Craig; Yeo, Benjamin

    2003-01-01

    Notes that a growing body of scholarship on computers and pedagogy encompasses a broad range of topics. Focuses on research judged to have implications within journalism and mass communication education. Discusses literature which considers computer use in course design and teaching, student attributes in a digital learning context, the role of…

  15. Computational Efficiency through Visual Argument: Do Graphic Organizers Communicate Relations in Text Too Effectively?

    Science.gov (United States)

    Robinson, Daniel H.; Schraw, Gregory

    1994-01-01

    Three experiments involving 138 college students investigated why one type of graphic organizer (a matrix) may communicate interconcept relations better than an outline or text. Results suggest that a matrix is more computationally efficient than either outline or text, allowing the easier computation of relationships. (SLD)

  16. Communication Skills Training in Pediatric Oncology: Moving Beyond Role Modeling.

    Science.gov (United States)

    Feraco, Angela M; Brand, Sarah R; Mack, Jennifer W; Kesselheim, Jennifer C; Block, Susan D; Wolfe, Joanne

    2016-06-01

    Communication is central to pediatric oncology care. Pediatric oncologists disclose life-threatening diagnoses, explain complicated treatment options, and endeavor to give honest prognoses, to maintain hope, to describe treatment complications, and to support families in difficult circumstances ranging from loss of function and fertility to treatment-related or disease-related death. However, parents, patients, and providers report substantial communication deficits. Poor communication outcomes may stem, in part, from insufficient communication skills training, overreliance on role modeling, and failure to utilize best practices. This review summarizes evidence for existing methods to enhance communication skills and calls for revitalizing communication skills training within pediatric oncology.

  17. A computational model for feature binding

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The "Binding Problem" is an important problem across many disciplines, including psychology, neuroscience, computational modeling, and even philosophy. In this work, we proposed a novel computational model, Bayesian Linking Field Model, for feature binding in visual perception, by combining the idea of noisy neuron model, Bayesian method, Linking Field Network and competitive mechanism. Simulation Experiments demonstrated that our model perfectly fulfilled the task of feature binding in visual perception and provided us some enlightening idea for future research.

  18. A computational model for feature binding

    Institute of Scientific and Technical Information of China (English)

    SHI ZhiWei; SHI ZhongZhi; LIU Xi; SHI ZhiPing

    2008-01-01

    The "Binding Problem" is an important problem across many disciplines, including psychology, neuroscience, computational modeling, and even philosophy. In this work, we proposed a novel computational model, Bayesian Linking Field Model, for feature binding in visual perception, by combining the idea of noisy neuron model, Bayesian method, Linking Field Network and competitive mechanism.Simulation Experiments demonstrated that our model perfectly fulfilled the task of feature binding in visual perception and provided us some enlightening idea for future research.

  19. Computational nanophotonics modeling and applications

    CERN Document Server

    Musa, Sarhan M

    2013-01-01

    This reference offers tools for engineers, scientists, biologists, and others working with the computational techniques of nanophotonics. It introduces the key concepts of computational methods in a manner that is easily digestible for newcomers to the field. The book also examines future applications of nanophotonics in the technical industry and covers new developments and interdisciplinary research in engineering, science, and medicine. It provides an overview of the key computational nanophotonics and describes the technologies with an emphasis on how they work and their key benefits.

  20. A new metric enabling an exact hypergraph model for the communication volume in distributed-memory parallel applications

    NARCIS (Netherlands)

    Fortmeier, O.; Bücker, H.M.; Fagginger Auer, B.O.; Bisseling, R.H.

    2013-01-01

    A hypergraph model for mapping applications with an all-neighbor communication pattern to distributed-memory computers is proposed, which originated in finite element triangulations. Rather than approximating the communication volume for linear algebra operations, this new model represents the commu

  1. Learning experiences of science teachers in a computer-mediated communication context

    Science.gov (United States)

    Chung, Chia-Jung

    improving teaching practices and for professional development. The results of this study suggest that applying computer-mediated communication in teacher education would impact positively on teachers' growth in critical reflection and social-interpersonal rapport. Furthermore, this study may encourage other researchers to use cognitive and social learning theories as the theoretical backgrounds for developing teacher educational models by applying computer conferencing.

  2. Propagation Modeling and Analysis of Molecular Motors in Molecular Communication.

    Science.gov (United States)

    Chahibi, Youssef; Akyildiz, Ian F; Balasingham, Ilangko

    2016-12-01

    Molecular motor networks (MMNs) are networks constructed from molecular motors to enable nanomachines to perform coordinated tasks of sensing, computing, and actuation at the nano- and micro- scales. Living cells are naturally enabled with this same mechanism to establish point-to-point communication between different locations inside the cell. Similar to a railway system, the cytoplasm contains an intricate infrastructure of tracks, named microtubules, interconnecting different internal components of the cell. Motor proteins, such as kinesin and dynein, are able to travel along these tracks directionally, carrying with them large molecules that would otherwise be unreliably transported across the cytoplasm using free diffusion. Molecular communication has been previously proposed for the design and study of MMNs. However, the topological aspects of MMNs, including the effects of branches, have been ignored in the existing studies. In this paper, a physical end-to-end model for MMNs is developed, considering the location of the transmitter node, the network topology, and the receiver nodes. The end-to-end gain and group delay are considered as the performance measures, and analytical expressions for them are derived. The analytical model is validated by Monte-Carlo simulations and the performance of MMNs is analyzed numerically. It is shown that, depending on their nature and position, MMN nodes create impedance effects that are critical for the overall performance. This model could be applied to assist the design of artificial MMNs and to study cargo transport in neurofilaments to elucidate brain diseases related to microtubule jamming.

  3. Intersections between the Autism Spectrum and the Internet: Perceived Benefits and Preferred Functions of Computer-Mediated Communication

    Science.gov (United States)

    Gillespie-Lynch, Kristen; Kapp, Steven K.; Shane-Simpson, Christina; Smith, David Shane; Hutman, Ted

    2014-01-01

    An online survey compared the perceived benefits and preferred functions of computer-mediated communication of participants with (N = 291) and without ASD (N = 311). Participants with autism spectrum disorder (ASD) perceived benefits of computer-mediated communication in terms of increased comprehension and control over communication, access to…

  4. Materials science. Materials that couple sensing, actuation, computation, and communication.

    Science.gov (United States)

    McEvoy, M A; Correll, N

    2015-03-20

    Tightly integrating sensing, actuation, and computation into composites could enable a new generation of truly smart material systems that can change their appearance and shape autonomously. Applications for such materials include airfoils that change their aerodynamic profile, vehicles with camouflage abilities, bridges that detect and repair damage, or robotic skins and prosthetics with a realistic sense of touch. Although integrating sensors and actuators into composites is becoming increasingly common, the opportunities afforded by embedded computation have only been marginally explored. Here, the key challenge is the gap between the continuous physics of materials and the discrete mathematics of computation. Bridging this gap requires a fundamental understanding of the constituents of such robotic materials and the distributed algorithms and controls that make these structures smart.

  5. Two Classes of Models of Granular Computing

    Institute of Scientific and Technical Information of China (English)

    Daowu Pei

    2006-01-01

    This paper reviews a class of important models of granular computing which are induced by equivalence relations, or by general binary relations, or by neighborhood systems, and propose a class of models of granular computing which are induced by coverings of the given universe.

  6. Large Scale Computations in Air Pollution Modelling

    DEFF Research Database (Denmark)

    Zlatev, Z.; Brandt, J.; Builtjes, P. J. H.

    Proceedings of the NATO Advanced Research Workshop on Large Scale Computations in Air Pollution Modelling, Sofia, Bulgaria, 6-10 July 1998......Proceedings of the NATO Advanced Research Workshop on Large Scale Computations in Air Pollution Modelling, Sofia, Bulgaria, 6-10 July 1998...

  7. Large Scale Computations in Air Pollution Modelling

    DEFF Research Database (Denmark)

    Zlatev, Z.; Brandt, J.; Builtjes, P. J. H.

    Proceedings of the NATO Advanced Research Workshop on Large Scale Computations in Air Pollution Modelling, Sofia, Bulgaria, 6-10 July 1998......Proceedings of the NATO Advanced Research Workshop on Large Scale Computations in Air Pollution Modelling, Sofia, Bulgaria, 6-10 July 1998...

  8. WebCom: A Model for Understanding Web Site Communication

    DEFF Research Database (Denmark)

    Godsk, Mikkel; Petersen, Anja Bechmann

    2008-01-01

    This chapter presents a model (WebCom) for understanding and analyzing Web site-mediated communication, also referred to as Web site communication. The model combines three theoretical approaches - communication, medium, and activity theory - into one generic model that benefits from each...... of the approaches' strengths. Furthermore, it is discussed and shortly demonstrated how WebCom can be used for analytical and design purposes with YouTube as an example. The chapter concludes that WebCom is able to serve as a theoretically-based model for understanding complex Web site communication situations...

  9. Sludge, biosolids, and the propaganda model of communication.

    Science.gov (United States)

    Rampton, Sheldon

    2002-01-01

    The Water Environment Federation's elaborate effort to rename sewage sludge as "biosolids" is an example in practice of the "propaganda model" of communications, which sees its task as indoctrinating target audiences with ideas favorable to the interests of the communicators. The propaganda model assumes that members of the public are irrational and focuses therefore on symbolic and emotional aspects of communication. This approach to communicating arouses public resentment rather than trust. In place of a "propaganda model," public officials should adopt a "democratic model," which assumes that audiences are rational and intellectually capable of meaningful participation in decision-making.

  10. Computer Aided Continuous Time Stochastic Process Modelling

    DEFF Research Database (Denmark)

    Kristensen, N.R.; Madsen, Henrik; Jørgensen, Sten Bay

    2001-01-01

    A grey-box approach to process modelling that combines deterministic and stochastic modelling is advocated for identification of models for model-based control of batch and semi-batch processes. A computer-aided tool designed for supporting decision-making within the corresponding modelling cycle...

  11. Applications of computer modeling at Wrightson, Johnson, Haddon & Williams, Inc

    Science.gov (United States)

    Johnson, James A.; Seep, Benjamin C.

    2002-05-01

    Computer modeling has become useful as an investigative tool and as a client communication and explanation tool in the field of acoustical consulting. A variety of in-house developed and commercially available applications is in constant use at the firm of Wrightson, Johnson, Haddon & Williams. Examples likely to be demonstrated (depending on time) include use of digital filtering for building exterior noise reduction comparisons, a shell isolation rating (SIR) model, simple sound barrier programs, an HVAC spreadsheet, a visual sightline modeling tool, specular sound reflections in a semicircular arc, and some uses of CATT-acoustic auralizations.

  12. Computer-Assisted Communication Device for Botulinum-Intoxicated Patients

    Science.gov (United States)

    2008-01-01

    amyotrophic lateral sclerosis , especially if mechanical ventilation is required. 6 Comparison with implanted devices A number of Brain-Computer Interface...1998) ‘Botulism in the United States: a clinical and epidemiological review’, Ann. Intern. Med., Vol. 129, pp.221–228. Simpson, L.L. (1981) ‘The

  13. Cloud Computing E-Communication Services in the University Environment

    Science.gov (United States)

    Babin, Ron; Halilovic, Branka

    2017-01-01

    The use of cloud computing services has grown dramatically in post-secondary institutions in the last decade. In particular, universities have been attracted to the low-cost and flexibility of acquiring cloud software services from Google, Microsoft and others, to implement e-mail, calendar and document management and other basic office software.…

  14. The associations among computer-mediated communication, relationships, and well-being.

    Science.gov (United States)

    Schiffrin, Holly; Edelman, Anna; Falkenstern, Melissa; Stewart, Cassandra

    2010-06-01

    Social support provided by interpersonal relationships is one of the most robust correlates of well-being. Self-disclosure serves as a basic building block of these relationships. With the rapid growth of the Internet in recent years, the question remains how self-disclosure, and subsequently relationships and well-being, differ when people communicate over the Internet rather than in person. The purpose of this article is to describe current Internet usage patterns as well as explore the association of Internet usage and well-being. Additionally, it directly compares the perceived benefits of face-to-face communication and computer-mediated communication. A questionnaire was administered to 99 undergraduates to measure Internet usage patterns, communication partners, self-disclosure, extraversion, and subjective well-being. Although Internet communication was found to be common, individuals perceived computer-mediated communication to be less useful than face-to-face communication. In addition, increased Internet usage was associated with decreased well-being. Implications are discussed in terms of a new Internet paradox in which people increasingly use the Internet for communication, although they perceive it to be less beneficial than face-to-face interactions and it is associated with reduced well-being.

  15. Element-Based Computational Model

    Directory of Open Access Journals (Sweden)

    Conrad Mueller

    2012-02-01

    Full Text Available A variation on the data-flow model is proposed to use for developing parallel architectures. While the model is a data driven model it has significant differences to the data-flow model. The proposed model has an evaluation cycleof processing elements (encapsulated data that is similar to the instruction cycle of the von Neumann model. The elements contain the information required to process them. The model is inherently parallel. An emulation of the model has been implemented. The objective of this paper is to motivate support for taking the research further. Using matrix multiplication as a case study, the element/data-flow based model is compared with the instruction-based model. This is done using complexity analysis followed by empirical testing to verify this analysis. The positive results are given as motivation for the research to be taken to the next stage - that is, implementing the model using FPGAs.

  16. ADVANCED COMPUTATIONAL METHODS IN DOSE MODELING: APPLICATION OF COMPUTATIONAL BIOPHYSICAL TRANSPORT, COMPUTATIONAL CHEMISTRY, AND COMPUTATIONAL BIOLOGY

    Science.gov (United States)

    Computational toxicology (CompTox) leverages the significant gains in computing power and computational techniques (e.g., numerical approaches, structure-activity relationships, bioinformatics) realized over the last few years, thereby reducing costs and increasing efficiency i...

  17. Computer-mediated communication and the Gallaudet University community: a preliminary report.

    Science.gov (United States)

    Hogg, Nanette M; Lomicky, Carol S; Weiner, Stephen F

    2008-01-01

    The study examined the use of computer-mediated communication (CMC) among individuals involved in a conflict sparked by the appointment of an administrator as president-designate of Gallaudet University in 2006. CMC was defined as forms of communication used for transmitting (sharing) information through networks with digital devices. There were 662 survey respondents. Respondents reported overwhelmingly (98%) that they used CMC to communicate. Students and alumni reported CMC use in larger proportions than any other group. The favorite devices among all respondents were Sidekicks, stationary computers, and laptops. Half of all respondents also reported using some form of video device. Nearly all reported using e-mail; respondents also identified Web surfing, text messaging, and blogging as popular CMC activities. The authors plan another article reporting on computer and electronic technology use as a mechanism connecting collective identity to social movements.

  18. 1st International Conference on Computational Advancement in Communication Circuits and Systems

    CERN Document Server

    Dalapati, Goutam; Banerjee, P; Mallick, Amiya; Mukherjee, Moumita

    2015-01-01

    This book comprises the proceedings of 1st International Conference on Computational Advancement in Communication Circuits and Systems (ICCACCS 2014) organized by Narula Institute of Technology under the patronage of JIS group, affiliated to West Bengal University of Technology. The conference was supported by Technical Education Quality Improvement Program (TEQIP), New Delhi, India and had technical collaboration with IEEE Kolkata Section, along with publication partner by Springer. The book contains 62 refereed papers that aim to highlight new theoretical and experimental findings in the field of Electronics and communication engineering including interdisciplinary fields like Advanced Computing, Pattern Recognition and Analysis, Signal and Image Processing. The proceedings cover the principles, techniques and applications in microwave & devices, communication & networking, signal & image processing, and computations & mathematics & control. The proceedings reflect the conference’s emp...

  19. Computational modeling of lipoprotein metabolism

    NARCIS (Netherlands)

    Schalkwijk, Daniël Bernardus van

    2013-01-01

    This PhD thesis contains the following chapters. The first part, containing chapter 2 and 3 mainly concerns model development. Chapter 2 describes the development of a mathematical modeling framework within which different diagnostic models based on lipoprotein profiles can be developed, and a first

  20. Virtual collaboration: face-to-face versus videoconference, audioconference, and computer-mediated communications

    Science.gov (United States)

    Wainfan, Lynne; Davis, Paul K.

    2004-08-01

    As we increase our reliance on mediated communication, it is important to be aware the media's influence on group processes and outcomes. A review of 40+ years of research shows that all media-videoconference, audioconference, and computer-mediated communication--change the context of the communication to some extent, reducing cues used to regulate and understand conversation, indicate participants' power and status, and move the group towards agreement. Text-based computer-mediated communication, the "leanest" medum, reduces status effects, domination, and consensus. This has been shown useful in broadening the range of inputs and ideas. However, it has also been shown to increase polarization, deindividuation, and disinhibition, and the time to reach a conclusion. For decision-making tasks, computer-mediated communication can increase choice shift and the likelihood of more risky or extreme decisions. In both videoconference and audioconference, participants cooperate less with linked collaborators, and shift their opinions toward extreme options, compared with face-to-face collaboration. In videoconference and audioconference, local coalitions can form where participants tend to agree more with those in the same room than those on the other end of the line. There is also a tendency in audioconference to disagree with those on the other end of the phone. This paper is a summary of a much more extensive forthcoming report; it reviews the research literature and proposes strategies to leverage the benefits of mediated communication while mitigating its adverse effects.

  1. Computer Aided Modelling – Opportunities and Challenges

    DEFF Research Database (Denmark)

    2011-01-01

    This chapter considers the opportunities that are present in developing, extending and applying aspects of computer-aided modelling principles and practice. What are the best tasks to be done by modellers and what needs the application of CAPE tools? How do we efficiently develop model-based solu......This chapter considers the opportunities that are present in developing, extending and applying aspects of computer-aided modelling principles and practice. What are the best tasks to be done by modellers and what needs the application of CAPE tools? How do we efficiently develop model...

  2. Green communication: The enabler to multiple business models

    DEFF Research Database (Denmark)

    Lindgren, Peter; Clemmensen, Suberia; Taran, Yariv

    2010-01-01

    Companies stand at the forefront of a new business model reality with new potentials - that will change their basic understanding and practice of running their business models radically. One of the drivers to this change is green communication, its strong relation to green business models and its...... possibility to enable lower energy consumption. This paper shows how green communication enables innovation of green business models and multiple business models running simultaneously in different markets to different customers....

  3. Introducing Seismic Tomography with Computational Modeling

    Science.gov (United States)

    Neves, R.; Neves, M. L.; Teodoro, V.

    2011-12-01

    Learning seismic tomography principles and techniques involves advanced physical and computational knowledge. In depth learning of such computational skills is a difficult cognitive process that requires a strong background in physics, mathematics and computer programming. The corresponding learning environments and pedagogic methodologies should then involve sets of computational modelling activities with computer software systems which allow students the possibility to improve their mathematical or programming knowledge and simultaneously focus on the learning of seismic wave propagation and inverse theory. To reduce the level of cognitive opacity associated with mathematical or programming knowledge, several computer modelling systems have already been developed (Neves & Teodoro, 2010). Among such systems, Modellus is particularly well suited to achieve this goal because it is a domain general environment for explorative and expressive modelling with the following main advantages: 1) an easy and intuitive creation of mathematical models using just standard mathematical notation; 2) the simultaneous exploration of images, tables, graphs and object animations; 3) the attribution of mathematical properties expressed in the models to animated objects; and finally 4) the computation and display of mathematical quantities obtained from the analysis of images and graphs. Here we describe virtual simulations and educational exercises which enable students an easy grasp of the fundamental of seismic tomography. The simulations make the lecture more interactive and allow students the possibility to overcome their lack of advanced mathematical or programming knowledge and focus on the learning of seismological concepts and processes taking advantage of basic scientific computation methods and tools.

  4. FORMING THE ICT-COMPETENCE COMMUNICATION COMPONENT OF THE COMPUTER PROFILE ENGINEERS-PEDAGOGUES

    Directory of Open Access Journals (Sweden)

    Yevhen V. Tymoshenko

    2014-09-01

    Full Text Available In the article it is investigated the problem of ICT-competence formation of the future computer profile engineers-teachers. It has been analyzed scientific papers that study development issues of information and communication competence of students in the field of ІCT. It is pointed out the need for further development of communication component and suggested to apply for this the B. Bloom's cognitive processes measurement system. Based on the competency approach and improved B. Bloom's pedagogical purposes taxonomy it has been developed a cognitive processes measuring system aiming to form ICT-competence communication component.

  5. Uncertainty in biology a computational modeling approach

    CERN Document Server

    Gomez-Cabrero, David

    2016-01-01

    Computational modeling of biomedical processes is gaining more and more weight in the current research into the etiology of biomedical problems and potential treatment strategies.  Computational modeling allows to reduce, refine and replace animal experimentation as well as to translate findings obtained in these experiments to the human background. However these biomedical problems are inherently complex with a myriad of influencing factors, which strongly complicates the model building and validation process.  This book wants to address four main issues related to the building and validation of computational models of biomedical processes: Modeling establishment under uncertainty Model selection and parameter fitting Sensitivity analysis and model adaptation Model predictions under uncertainty In each of the abovementioned areas, the book discusses a number of key-techniques by means of a general theoretical description followed by one or more practical examples.  This book is intended for graduate stude...

  6. Automatic discovery of the communication network topology for building a supercomputer model

    Science.gov (United States)

    Sobolev, Sergey; Stefanov, Konstantin; Voevodin, Vadim

    2016-10-01

    The Research Computing Center of Lomonosov Moscow State University is developing the Octotron software suite for automatic monitoring and mitigation of emergency situations in supercomputers so as to maximize hardware reliability. The suite is based on a software model of the supercomputer. The model uses a graph to describe the computing system components and their interconnections. One of the most complex components of a supercomputer that needs to be included in the model is its communication network. This work describes the proposed approach for automatically discovering the Ethernet communication network topology in a supercomputer and its description in terms of the Octotron model. This suite automatically detects computing nodes and switches, collects information about them and identifies their interconnections. The application of this approach is demonstrated on the "Lomonosov" and "Lomonosov-2" supercomputers.

  7. A model of visual, aesthetic communication focusing on web sites

    DEFF Research Database (Denmark)

    Thorlacius, Lisbeth

    2002-01-01

    design. With a point of departure in Roman Jakobson's linguistic communication model, the reader is introduced to a model which covers the communication aspects, the visual aspects, the aesthetic aspects and the net specific aspects of the analysis of media products. The aesthetic aspects rank low...

  8. Visual and Computational Modelling of Minority Games

    OpenAIRE

    Robertas Damaševičius; Darius Ašeriškis

    2017-01-01

    The paper analyses the Minority Game and focuses on analysis and computational modelling of several variants (variable payoff, coalition-based and ternary voting) of Minority Game using UAREI (User-Action-Rule-Entities-Interface) model. UAREI is a model for formal specification of software gamification, and the UAREI visual modelling language is a language used for graphical representation of game mechanics. The URAEI model also provides the embedded executable modelling framework to evaluate...

  9. Communicating in Collectivistic Culture: Relationship between Interdependent Self-Construal and Cooperative Communication in Cross-Cultural Communication Model

    Directory of Open Access Journals (Sweden)

    Hoo Pin Lick Soo

    2017-01-01

    Full Text Available This concept paper proposes that when companies have expanded their business and operation throughout the Asian countries, the success or failure of a company abroad depends on how effectively its business negotiators can apply their cross-cultural communication skills in a new cultural environment. At the forefront of this change is interdependent self-construal, which stands as communication medium on interaction goals (international business negotiation outcome in collectivistic culture. The international trade may bring about a lot in terms of cross-cultural communication and international business negotiation, but adopting cooperative communication in the international business negotiations will create more integrative agreements between the international business negotiators. Many scholars believe that if both parties have similarities in communication styles, it will lead to positive interaction (cooperative communication that contributes to cooperation and influences the interaction goals (negotiation outcome. This paper offers critical insight into the theoretical link between interdependent selfconstrual and interaction goals. The proposed cross-cultural communication model uses interdependent self-construal and cooperative communication to understand when collectivistic business negotiators develop relationships that promotes positive interaction goals (negotiation outcome.

  10. Extended master equation models for molecular communication networks

    CERN Document Server

    Chou, Chun Tung

    2012-01-01

    We consider molecular communication networks consisting of transmitters and receivers distributed in a fluidic medium. In such networks, a transmitter sends one or more signalling molecules, which are diffused over the medium, to the receiver to realise the communication. In order to be able to engineer synthetic molecular communication networks, mathematical models for these networks are required. This paper proposes a new stochastic model for molecular communication networks called reaction-diffusion master equation with exogenous input (RDMEX). The key idea behind RDMEX is to model the transmitters as time sequences specify the emission patterns of signalling molecules, while diffusion in the medium and chemical reactions at the receivers are modelled as Markov processes using master equation. An advantage of RDMEX is that it can readily be used to model molecular communication networks with multiple transmitters and receivers. For the case where the reaction kinetics at the receivers is linear, we show ho...

  11. Language Model Applications to Spelling with Brain-Computer Interfaces

    Directory of Open Access Journals (Sweden)

    Anderson Mora-Cortes

    2014-03-01

    Full Text Available Within the Ambient Assisted Living (AAL community, Brain-Computer Interfaces (BCIs have raised great hopes as they provide alternative communication means for persons with disabilities bypassing the need for speech and other motor activities. Although significant advancements have been realized in the last decade, applications of language models (e.g., word prediction, completion have only recently started to appear in BCI systems. The main goal of this article is to review the language model applications that supplement non-invasive BCI-based communication systems by discussing their potential and limitations, and to discern future trends. First, a brief overview of the most prominent BCI spelling systems is given, followed by an in-depth discussion of the language models applied to them. These language models are classified according to their functionality in the context of BCI-based spelling: the static/dynamic nature of the user interface, the use of error correction and predictive spelling, and the potential to improve their classification performance by using language models. To conclude, the review offers an overview of the advantages and challenges when implementing language models in BCI-based communication systems when implemented in conjunction with other AAL technologies.

  12. [Skilled communication as "intervention" : Models for systematic communication in the healthcare system].

    Science.gov (United States)

    Weinert, M; Mayer, H; Zojer, E

    2015-02-01

    Specific communication training is currently not integrated into anesthesiology curricula. At the same time communication is an important key factor when working with colleagues, in the physician-patient relationship, during management of emergencies and in avoiding or reducing the legal consequences of adverse medical events. Therefore, focused attention should be brought to this area. In other high risk industries, specific communication training has been standard for a long time and in medicine there is an approach to teach and train these soft skills by simulation. Systematic communication training, however, is rarely an established component of specialist training. It is impossible not to communicate whereby nonverbal indications, such as gestures, mimic expression, posture and tone play an important part. Miscommunication, however, is common and leads to unproductive behavior. The cause of this is not always obvious. This article provides an overview of the communication models of Shannon, Watzlawick et al. and Schulz von Thun et al. and describes their limitations. The "Process Communication Model®" (PCM) is also introduced. An overview is provided with examples of how this tool can be used to look at the communication process from a systematic point of view. People have different psychological needs. Not taking care of these needs will result in individual stress behavior, which can be graded into first, second and third degrees of severity (driver behavior, mask behavior and desperation). These behavior patterns become exposed in predictable sequences. Furthermore, on the basis of this model, successful communication can be established while unproductive behavior that occurs during stress can be dealt with appropriately. Because of the importance of communication in all areas of medical care, opportunities exist to focus research on the influence of targeted communication on patient outcome, complications and management of emergencies.

  13. Computer-Aided Modelling Methods and Tools

    DEFF Research Database (Denmark)

    Cameron, Ian; Gani, Rafiqul

    2011-01-01

    The development of models for a range of applications requires methods and tools. In many cases a reference model is required that allows the generation of application specific models that are fit for purpose. There are a range of computer aided modelling tools available that help to define...... a taxonomy of aspects around conservation, constraints and constitutive relations. Aspects of the ICAS-MoT toolbox are given to illustrate the functionality of a computer aided modelling tool, which incorporates an interface to MS Excel....

  14. Notions of similarity for computational biology models

    KAUST Repository

    Waltemath, Dagmar

    2016-03-21

    Computational models used in biology are rapidly increasing in complexity, size, and numbers. To build such large models, researchers need to rely on software tools for model retrieval, model combination, and version control. These tools need to be able to quantify the differences and similarities between computational models. However, depending on the specific application, the notion of similarity may greatly vary. A general notion of model similarity, applicable to various types of models, is still missing. Here, we introduce a general notion of quantitative model similarities, survey the use of existing model comparison methods in model building and management, and discuss potential applications of model comparison. To frame model comparison as a general problem, we describe a theoretical approach to defining and computing similarities based on different model aspects. Potentially relevant aspects of a model comprise its references to biological entities, network structure, mathematical equations and parameters, and dynamic behaviour. Future similarity measures could combine these model aspects in flexible, problem-specific ways in order to mimic users\\' intuition about model similarity, and to support complex model searches in databases.

  15. Message communications of particular message types between compute nodes using DMA shadow buffers

    Science.gov (United States)

    Blocksome, Michael A.; Parker, Jeffrey J.

    2010-11-16

    Message communications of particular message types between compute nodes using DMA shadow buffers includes: receiving a buffer identifier specifying an application buffer having a message of a particular type for transmission to a target compute node through a network; selecting one of a plurality of shadow buffers for a DMA engine on the compute node for storing the message, each shadow buffer corresponding to a slot of an injection FIFO buffer maintained by the DMA engine; storing the message in the selected shadow buffer; creating a data descriptor for the message stored in the selected shadow buffer; injecting the data descriptor into the slot of the injection FIFO buffer corresponding to the selected shadow buffer; selecting the data descriptor from the injection FIFO buffer; and transmitting the message specified by the selected data descriptor through the data communications network to the target compute node.

  16. Preparing computers for affective communication: a psychophysiological concept and preliminary results.

    Science.gov (United States)

    Whang, Min Cheol; Lim, Joa Sang; Boucsein, Wolfram

    Despite rapid advances in technology, computers remain incapable of responding to human emotions. An exploratory study was conducted to find out what physiological parameters might be useful to differentiate among 4 emotional states, based on 2 dimensions: pleasantness versus unpleasantness and arousal versus relaxation. The 4 emotions were induced by exposing 26 undergraduate students to different combinations of olfactory and auditory stimuli, selected in a pretest from 12 stimuli by subjective ratings of arousal and valence. Changes in electroencephalographic (EEG), heart rate variability, and electrodermal measures were used to differentiate the 4 emotions. EEG activity separates pleasantness from unpleasantness only in the aroused but not in the relaxed domain, where electrodermal parameters are the differentiating ones. All three classes of parameters contribute to a separation between arousal and relaxation in the positive valence domain, whereas the latency of the electrodermal response is the only differentiating parameter in the negative domain. We discuss how such a psychophysiological approach may be incorporated into a systemic model of a computer responsive to affective communication from the user.

  17. Computational models for analyzing lipoprotein profiles

    NARCIS (Netherlands)

    Graaf, A.A. de; Schalkwijk, D.B. van

    2011-01-01

    At present, several measurement technologies are available for generating highly detailed concentration-size profiles of lipoproteins, offering increased diagnostic potential. Computational models are useful in aiding the interpretation of these complex datasets and making the data more accessible f

  18. Informing mechanistic toxicology with computational molecular models.

    Science.gov (United States)

    Goldsmith, Michael R; Peterson, Shane D; Chang, Daniel T; Transue, Thomas R; Tornero-Velez, Rogelio; Tan, Yu-Mei; Dary, Curtis C

    2012-01-01

    Computational molecular models of chemicals interacting with biomolecular targets provides toxicologists a valuable, affordable, and sustainable source of in silico molecular level information that augments, enriches, and complements in vitro and in vivo efforts. From a molecular biophysical ansatz, we describe how 3D molecular modeling methods used to numerically evaluate the classical pair-wise potential at the chemical/biological interface can inform mechanism of action and the dose-response paradigm of modern toxicology. With an emphasis on molecular docking, 3D-QSAR and pharmacophore/toxicophore approaches, we demonstrate how these methods can be integrated with chemoinformatic and toxicogenomic efforts into a tiered computational toxicology workflow. We describe generalized protocols in which 3D computational molecular modeling is used to enhance our ability to predict and model the most relevant toxicokinetic, metabolic, and molecular toxicological endpoints, thereby accelerating the computational toxicology-driven basis of modern risk assessment while providing a starting point for rational sustainable molecular design.

  19. Computational fluid dynamics modeling in yarn engineering

    CSIR Research Space (South Africa)

    Patanaik, A

    2011-07-01

    Full Text Available This chapter deals with the application of computational fluid dynamics (CFD) modeling in reducing yarn hairiness during the ring spinning process and thereby “engineering” yarn with desired properties. Hairiness significantly affects the appearance...

  20. Computational Models for Nonlinear Aeroelastic Systems Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Clear Science Corp. and Duke University propose to develop and demonstrate a new and efficient computational method of modeling nonlinear aeroelastic systems. The...

  1. A new epidemic model of computer viruses

    Science.gov (United States)

    Yang, Lu-Xing; Yang, Xiaofan

    2014-06-01

    This paper addresses the epidemiological modeling of computer viruses. By incorporating the effect of removable storage media, considering the possibility of connecting infected computers to the Internet, and removing the conservative restriction on the total number of computers connected to the Internet, a new epidemic model is proposed. Unlike most previous models, the proposed model has no virus-free equilibrium and has a unique endemic equilibrium. With the aid of the theory of asymptotically autonomous systems as well as the generalized Poincare-Bendixson theorem, the endemic equilibrium is shown to be globally asymptotically stable. By analyzing the influence of different system parameters on the steady number of infected computers, a collection of policies is recommended to prohibit the virus prevalence.

  2. Computer Model Locates Environmental Hazards

    Science.gov (United States)

    2008-01-01

    Catherine Huybrechts Burton founded San Francisco-based Endpoint Environmental (2E) LLC in 2005 while she was a student intern and project manager at Ames Research Center with NASA's DEVELOP program. The 2E team created the Tire Identification from Reflectance model, which algorithmically processes satellite images using turnkey technology to retain only the darkest parts of an image. This model allows 2E to locate piles of rubber tires, which often are stockpiled illegally and cause hazardous environmental conditions and fires.

  3. Error Mitigation of Point-to-Point Communication for Fault-Tolerant Computing

    Science.gov (United States)

    Akamine, Robert L.; Hodson, Robert F.; LaMeres, Brock J.; Ray, Robert E.

    2011-01-01

    Fault tolerant systems require the ability to detect and recover from physical damage caused by the hardware s environment, faulty connectors, and system degradation over time. This ability applies to military, space, and industrial computing applications. The integrity of Point-to-Point (P2P) communication, between two microcontrollers for example, is an essential part of fault tolerant computing systems. In this paper, different methods of fault detection and recovery are presented and analyzed.

  4. Descriptive Study of Student's Attitudes Toward Communicating Computers in an Elementary Science Methods Course

    OpenAIRE

    Gulsen BAGCI KILIC

    2001-01-01

    This research study was conducted in Indiana University in the fall semester of 1998-99 academic-year. The aim of the study was to analyze the affect of using telecommunication technologies on pre-service teachers’ attitudes toward computers and their attitudes toward communicating on computers. The telecommunication technologies integrated were Alta Vista Forum and Tapped In. Alta Vista Forum is an electronic conferencing program and Tapped In is a Multi User Virtual Environment. A survey...

  5. Cloud Computing Adoption Model for Universities to Increase ICT Proficiency

    Directory of Open Access Journals (Sweden)

    Safiya Okai

    2014-08-01

    Full Text Available Universities around the world especially those in developing countries are faced with the problem of delivering the level of information and communications technology (ICT needed to facilitate teaching, learning, research, and development activities ideal in a typical university, which is needed to meet educational needs in-line with advancement in technology and the growing dependence on IT. This is mainly due to the high cost involved in providing and maintaining the needed hardware and software. A technology such as cloud computing that delivers on demand provisioning of IT resources on a pay per use basis can be used to address this problem. Cloud computing promises better delivery of IT services as well as availability whenever and wherever needed at reduced costs with users paying only as much as they consume through the services of cloud service providers. The cloud technology reduces complexity while increasing speed and quality of IT services provided; however, despite these benefits the challenges that come with its adoption have left many sectors especially the higher education skeptical in committing to this technology. This article identifies the reasons for the slow rate of adoption of cloud computing at university level, discusses the challenges faced and proposes a cloud computing adoption model that contains strategic guidelines to overcome the major challenges identified and a roadmap for the successful adoption of cloud computing by universities. The model was tested in one of the universities and found to be both useful and appropriate for adopting cloud computing at university level.

  6. Parallel computing in atmospheric chemistry models

    Energy Technology Data Exchange (ETDEWEB)

    Rotman, D. [Lawrence Livermore National Lab., CA (United States). Atmospheric Sciences Div.

    1996-02-01

    Studies of atmospheric chemistry are of high scientific interest, involve computations that are complex and intense, and require enormous amounts of I/O. Current supercomputer computational capabilities are limiting the studies of stratospheric and tropospheric chemistry and will certainly not be able to handle the upcoming coupled chemistry/climate models. To enable such calculations, the authors have developed a computing framework that allows computations on a wide range of computational platforms, including massively parallel machines. Because of the fast paced changes in this field, the modeling framework and scientific modules have been developed to be highly portable and efficient. Here, the authors present the important features of the framework and focus on the atmospheric chemistry module, named IMPACT, and its capabilities. Applications of IMPACT to aircraft studies will be presented.

  7. Learning Pragmatics through Computer-Mediated Communication in Taiwan

    Directory of Open Access Journals (Sweden)

    Zohreh R. Eslami

    2013-05-01

    Full Text Available This study investigated the effectiveness of explicit pragmaticinstruction on the acquisition of requests by college-levelEnglish as Foreign Language (EFL learners in Taiwan. Thegoal was to determine first whether the use of explicitpragmatic instruction had a positive effect on EFL learners’pragmatic competence. Second, the relative effectiveness ofpresenting pragmatics through two delivery systems—faceto-face, in-class activities and computer-mediatedcommunication (CMC via e-mail and WebCT—was compared.One hundred and eighteen Taiwanese undergraduate studentscompleted the entire study. There were 40 students in thecontrol group, 36 students in the experimental/ TeacherInstruction group and 42 students in the experimental/CMCgroup. The results showed that explicit pragmatic instructionhad a positive impact on the EFL learners in both the TeacherInstruction and CMC groups. Learners who received explicitpragmatic instruction performed better on the DiscourseCompletion Task posttest than those who did not. Thefindings also indicated that technology can be a valuable toolfor delivering pragmatics instruction.

  8. COMPUTER-MEDIATED COMMUNICATION IN FOREIGN LANGUAGE EDUCATION: Use of Target Language and Learner Perceptions

    Directory of Open Access Journals (Sweden)

    Nesrin OZDENER

    2008-04-01

    Full Text Available Among the challenges many teachers face in facilitating the improvement of speaking skills are sparing sufficient time for practice to enable students to achieve fluency in speaking through internalizing the structures, and establishing a balance between fluency and accuracy. This study aimed to seek an answer to the question as to whether Computer-Mediated Communication Technologies be a solution for overcoming these problems. The study was conducted as additional practice to the foreign language lessons with the participation of 60 students. Task-based language teaching principles were taken as basis in preparation of the teaching materials in the study, in which text and voice chat applications among the Computer-Mediated Communication Technologies were used. During the applications data were collected in several ways: participants’ perspectives regarding their changing experiences and the types of tasks used were investigated through the use of open-ended questionnaires after each session; a general insight was obtained into the students’ experiences with close-ended questionnaires given at the end of the study; and the use of the target language in communications among students were determined by investigating the text communication logs. From a user-oriented perspective, the results of the study shed light on the strategies that can be used in computer-mediated communication technologies valuing the experiences and perceptions of the learners.

  9. A Computational Framework for Realistic Retina Modeling.

    Science.gov (United States)

    Martínez-Cañada, Pablo; Morillas, Christian; Pino, Begoña; Ros, Eduardo; Pelayo, Francisco

    2016-11-01

    Computational simulations of the retina have led to valuable insights about the biophysics of its neuronal activity and processing principles. A great number of retina models have been proposed to reproduce the behavioral diversity of the different visual processing pathways. While many of these models share common computational stages, previous efforts have been more focused on fitting specific retina functions rather than generalizing them beyond a particular model. Here, we define a set of computational retinal microcircuits that can be used as basic building blocks for the modeling of different retina mechanisms. To validate the hypothesis that similar processing structures may be repeatedly found in different retina functions, we implemented a series of retina models simply by combining these computational retinal microcircuits. Accuracy of the retina models for capturing neural behavior was assessed by fitting published electrophysiological recordings that characterize some of the best-known phenomena observed in the retina: adaptation to the mean light intensity and temporal contrast, and differential motion sensitivity. The retinal microcircuits are part of a new software platform for efficient computational retina modeling from single-cell to large-scale levels. It includes an interface with spiking neural networks that allows simulation of the spiking response of ganglion cells and integration with models of higher visual areas.

  10. Proceedings Fifth Workshop on Developments in Computational Models--Computational Models From Nature

    CERN Document Server

    Cooper, S Barry; 10.4204/EPTCS.9

    2009-01-01

    The special theme of DCM 2009, co-located with ICALP 2009, concerned Computational Models From Nature, with a particular emphasis on computational models derived from physics and biology. The intention was to bring together different approaches - in a community with a strong foundational background as proffered by the ICALP attendees - to create inspirational cross-boundary exchanges, and to lead to innovative further research. Specifically DCM 2009 sought contributions in quantum computation and information, probabilistic models, chemical, biological and bio-inspired ones, including spatial models, growth models and models of self-assembly. Contributions putting to the test logical or algorithmic aspects of computing (e.g., continuous computing with dynamical systems, or solid state computing models) were also very much welcomed.

  11. Toward a Dynamically Reconfigurable Computing and Communication System for Small Spacecraft

    Science.gov (United States)

    Kifle, Muli; Andro, Monty; Tran, Quang K.; Fujikawa, Gene; Chu, Pong P.

    2003-01-01

    Future science missions will require the use of multiple spacecraft with multiple sensor nodes autonomously responding and adapting to a dynamically changing space environment. The acquisition of random scientific events will require rapidly changing network topologies, distributed processing power, and a dynamic resource management strategy. Optimum utilization and configuration of spacecraft communications and navigation resources will be critical in meeting the demand of these stringent mission requirements. There are two important trends to follow with respect to NASA's (National Aeronautics and Space Administration) future scientific missions: the use of multiple satellite systems and the development of an integrated space communications network. Reconfigurable computing and communication systems may enable versatile adaptation of a spacecraft system's resources by dynamic allocation of the processor hardware to perform new operations or to maintain functionality due to malfunctions or hardware faults. Advancements in FPGA (Field Programmable Gate Array) technology make it possible to incorporate major communication and network functionalities in FPGA chips and provide the basis for a dynamically reconfigurable communication system. Advantages of higher computation speeds and accuracy are envisioned with tremendous hardware flexibility to ensure maximum survivability of future science mission spacecraft. This paper discusses the requirements, enabling technologies, and challenges associated with dynamically reconfigurable space communications systems.

  12. Computer Modeling of Direct Metal Laser Sintering

    Science.gov (United States)

    Cross, Matthew

    2014-01-01

    A computational approach to modeling direct metal laser sintering (DMLS) additive manufacturing process is presented. The primary application of the model is for determining the temperature history of parts fabricated using DMLS to evaluate residual stresses found in finished pieces and to assess manufacturing process strategies to reduce part slumping. The model utilizes MSC SINDA as a heat transfer solver with imbedded FORTRAN computer code to direct laser motion, apply laser heating as a boundary condition, and simulate the addition of metal powder layers during part fabrication. Model results are compared to available data collected during in situ DMLS part manufacture.

  13. Computational Modeling of Culture's Consequences

    NARCIS (Netherlands)

    Hofstede, G.J.; Jonker, C.M.; Verwaart, T.

    2010-01-01

    This paper presents an approach to formalize the influence of culture on the decision functions of agents in social simulations. The key components are (a) a definition of the domain of study in the form of a decision model, (b) knowledge acquisition based on a dimensional theory of culture, resulti

  14. Computational aspects of premixing modelling

    Energy Technology Data Exchange (ETDEWEB)

    Fletcher, D.F. [Sydney Univ., NSW (Australia). Dept. of Chemical Engineering; Witt, P.J.

    1998-01-01

    In the steam explosion research field there is currently considerable effort being devoted to the modelling of premixing. Practically all models are based on the multiphase flow equations which treat the mixture as an interpenetrating continuum. Solution of these equations is non-trivial and a wide range of solution procedures are in use. This paper addresses some numerical aspects of this problem. In particular, we examine the effect of the differencing scheme for the convective terms and show that use of hybrid differencing can cause qualitatively wrong solutions in some situations. Calculations are performed for the Oxford tests, the BNL tests, a MAGICO test and to investigate various sensitivities of the solution. In addition, we show that use of a staggered grid can result in a significant error which leads to poor predictions of `melt` front motion. A correction is given which leads to excellent convergence to the analytic solution. Finally, we discuss the issues facing premixing model developers and highlight the fact that model validation is hampered more by the complexity of the process than by numerical issues. (author)

  15. Communicating Sustainability: An Operational Model for Evaluating Corporate Websites

    Directory of Open Access Journals (Sweden)

    Alfonso Siano

    2016-09-01

    Full Text Available The interest in corporate sustainability has increased rapidly in recent years and has encouraged organizations to adopt appropriate digital communication strategies, in which the corporate website plays a key role. Despite this growing attention in both the academic and business communities, models for the analysis and evaluation of online sustainability communication have not been developed to date. This paper aims to develop an operational model to identify and assess the requirements of sustainability communication in corporate websites. It has been developed from a literature review on corporate sustainability and digital communication and the analysis of the websites of the organizations included in the “Global CSR RepTrak 2015” by the Reputation Institute. The model identifies the core dimensions of online sustainability communication (orientation, structure, ergonomics, content—OSEC, sub-dimensions, such as stakeholder engagement and governance tools, communication principles, and measurable items (e.g., presence of the materiality matrix, interactive graphs. A pilot study on the websites of the energy and utilities companies included in the Dow Jones Sustainability World Index 2015 confirms the applicability of the OSEC framework. Thus, the model can provide managers and digital communication consultants with an operational tool that is useful for developing an industry ranking and assessing the best practices. The model can also help practitioners to identify corrective actions in the critical areas of digital sustainability communication and avoid greenwashing.

  16. Visual and Computational Modelling of Minority Games

    Directory of Open Access Journals (Sweden)

    Robertas Damaševičius

    2017-02-01

    Full Text Available The paper analyses the Minority Game and focuses on analysis and computational modelling of several variants (variable payoff, coalition-based and ternary voting of Minority Game using UAREI (User-Action-Rule-Entities-Interface model. UAREI is a model for formal specification of software gamification, and the UAREI visual modelling language is a language used for graphical representation of game mechanics. The URAEI model also provides the embedded executable modelling framework to evaluate how the rules of the game will work for the players in practice. We demonstrate flexibility of UAREI model for modelling different variants of Minority Game rules for game design.

  17. The Computer-Mediated Communication (CMC) Classroom: A Challenge of Medium, Presence, Interaction, Identity, and Relationship

    Science.gov (United States)

    Sherblom, John C.

    2010-01-01

    There is a "prevalence of computer-mediated communication (CMC) in education," and a concern for its negative psychosocial consequences and lack of effectiveness as an instructional tool. This essay identifies five variables in the CMC research literature and shows their moderating effect on the psychosocial, instructional expevrience of the CMC…

  18. Can Synchronous Computer-Mediated Communication (CMC) Help Beginning-Level Foreign Language Learners Speak?

    Science.gov (United States)

    Ko, Chao-Jung

    2012-01-01

    This study investigated the possibility that initial-level learners may acquire oral skills through synchronous computer-mediated communication (SCMC). Twelve Taiwanese French as a foreign language (FFL) students, divided into three groups, were required to conduct a variety of tasks in one of the three learning environments (video/audio, audio,…

  19. Building a Sense of Community for Text-Based Computer-Mediated Communication Courses

    Science.gov (United States)

    Yang, Harrison Hao; Liu, Yuliang

    2008-01-01

    Building a strong sense of community in text-based computer-mediated communication courses can be a challenge to instructors. This article presents how a sound practical approach called STEP is implemented into one text-based fully online course and one hybrid course at a university in the northeastern region of the United States. Students'…

  20. Computer Mediated Communication in the Universal Design for Learning Framework for Preparation of Special Education Teachers

    Science.gov (United States)

    Basham, James D.; Lowrey, K. Alisa; deNoyelles, Aimee

    2010-01-01

    This study investigated the Universal Design for Learning (UDL) framework as a basis for a bi-university computer mediated communication (CMC) collaborative project. Participants in the research included 78 students from two special education programs enrolled in teacher education courses. The focus of the investigation was on exploring the…

  1. Discourse Functions and Vocabulary Use in English Language Learners' Synchronous Computer-Mediated Communication

    Science.gov (United States)

    Rabab'ah, Ghaleb

    2013-01-01

    This study explores the discourse generated by English as a foreign language (EFL) learners using synchronous computer-mediated communication (CMC) as an approach to help English language learners to create social interaction in the classroom. It investigates the impact of synchronous CMC mode on the quantity of total words, lexical range and…

  2. Computer-Mediated Communication and Virtual Groups: Applications to Interethnic Conflict

    Science.gov (United States)

    Walther, Joseph B.

    2009-01-01

    This essay concerns applications of computer-mediated communication (CMC) research in groups toward the enhancement of relations between members of potentially hostile ethnopolitical groups. The characteristics of CMC offer several possible means of facilitating the reduction of animosity through online contact among intergroup constituents. The…

  3. Task Effects on Focus on Form in Synchronous Computer-Mediated Communication

    Science.gov (United States)

    Yilmaz, Yucel

    2011-01-01

    Previous research on synchronous computer-mediated communication (SCMC) has shown that SCMC interaction could draw learners' attention to form in ways that are similar to face-to-face interaction. However, the role of task type in focusing learners' attention on form has not been widely researched. In a repeated-measures design, this study…

  4. Computer Mediated Communication for Social and Academic Purposes: Profiles of Use and University Students' Gratifications

    Science.gov (United States)

    Vrocharidou, Anatoli; Efthymiou, Ilias

    2012-01-01

    The present study approaches the Internet as a social space, where university students make use of computer mediated communication (CMC) applications, i.e. e-mail, instant messaging and social network sites, in order to satisfy social and academic needs. We focus on university students, because they represent one of the most avid groups of CMC…

  5. Computer-mediated communication in adults with high-functioning autism spectrum disorders and controls

    NARCIS (Netherlands)

    van der Aa, Christine; Pollmann, Monique; Plaat, Aske; van der Gaag, Rutger Jan

    2016-01-01

    It has been suggested that people with Autism Spectrum Disorders (ASD) are attracted to computer-mediated communication (CMC). In this study, we compare CMC use in adults with high-functioning ASD (N = 113) and a control group (N = 72). We find that people with ASD spend more time on CMC than contro

  6. Personality Types and Megabytes: Student Attitudes toward Computer Mediated Communication (CMC) in the Language Classroom.

    Science.gov (United States)

    Beauvois, Margaret Healy; Eledge, Jean

    1996-01-01

    Describes the results of a pilot study to examine the attitudes of university students toward the use of computer-mediated communication in their French conversation and composition course. Results indicate that both introvert and extrovert personality types generally perceive the use of a local area network as a beneficial experience. (15…

  7. Breaching or building social boundaries? : SIDE-effects of computer-mediated communication

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Lea, M

    1998-01-01

    Computer-mediated communication (CMC) is sometimes heralded for its power to break down social boundaries and to liberate individuals from social influence, group pressure, and status and power differentials that characterize much face-to-face interaction. We review research conducted within the

  8. Nurturing Students' Problem-Solving Skills and Engagement in Computer-Mediated Communications (CMC)

    Science.gov (United States)

    Chen, Ching-Huei

    2014-01-01

    The present study sought to investigate how to enhance students' well- and ill-structured problem-solving skills and increase productive engagement in computer-mediated communication with the assistance of external prompts, namely procedural and reflection. Thirty-three graduate students were randomly assigned to two conditions: procedural and…

  9. Gender and Group Composition in Small Task Groups Using Computer-Mediated Communication.

    Science.gov (United States)

    Savicki, Victor; And Others

    1996-01-01

    Gender and group composition variables in a computer-mediated communication context are examined. Subjects were 36 undergraduate male and female psychology students. Findings are analyzed in terms of choice of language; participation; satisfaction; and interpersonal conflict. Ten tables present study results. (Author/AEF)

  10. The computer as means of communication for peer-review groups

    NARCIS (Netherlands)

    Geest, van der Thea; Remmers, Tim

    1994-01-01

    In a scientific-writing course, 15 of 54 students used a review-supporting computer program, PREP-EDITOR (PREP), to communicate with their peers about drafts. In an exploratory study, 10 students were interviewed regularly: 5 used PREP and 5 met face-to-face to exchange comments on drafts. The study

  11. Negotiation of Meaning in Synchronous Computer-Mediated Communication in Relation to Task Types

    Science.gov (United States)

    Cho, Hye-jin

    2011-01-01

    The present study explored how negotiation of meaning occurred in task-based synchronous computer-mediated communication (SCMC) environment among college English learners. Based on the theoretical framework of the interaction hypothesis and negotiation of meaning, four research questions arose: (1) how negotiation of meaning occur in non-native…

  12. Systems Management of Air Force Standard Communications-Computer systems: There is a Better Way

    Science.gov (United States)

    1988-04-01

    Statements of Operational Needs (SON), Justification for Major New Start (JMSNS), and Joint Service Operational Requirements ( JSOR ). Communications...computer systems requirements which must be processed using a SON, JMSNS, and JSOR are processed in accordance with AFR 57-1, Operational Needs, and

  13. Innovative methods of teaching computer science on the basis of "dynamic method" communicative dialogue

    Directory of Open Access Journals (Sweden)

    Janna Ivanova

    2013-05-01

    Full Text Available The questions about the mechanism of improving the efficiency of knowledge transfer in the traditional form of learning using an interactive method of communication in the form of discussions, with a view to a better mastery of the material in conducting classes in computer science.

  14. Effects of a Computer-Based Intervention Program on the Communicative Functions of Children with Autism

    Science.gov (United States)

    Hetzroni, Orit E.; Tannous, Juman

    2004-01-01

    This study investigated the use of computer-based intervention for enhancing communication functions of children with autism. The software program was developed based on daily life activities in the areas of play, food, and hygiene. The following variables were investigated: delayed echolalia, immediate echolalia, irrelevant speech, relevant…

  15. Interactive uncertainty reduction strategies and verbal affection in computer-mediated communication

    NARCIS (Netherlands)

    Antheunis, M.L.; Schouten, A.P.; Valkenburg, P.M.; Peter, J.

    2012-01-01

    The goal of this study was to investigate the language-based strategies that computer-mediated communication (CMC) users employ to reduce uncertainty in the absence of nonverbal cues. Specifically, this study investigated the prevalence of three interactive uncertainty reduction strategies (i.e.,

  16. Voice over IP: how computing technology is being used in mobile communications.

    Science.gov (United States)

    Johnson, William

    2005-01-01

    This article explains how computing technology was used to address the need for mobile communications among nursing staff. In 2004, nursing staff at Fauquier Hospital relocated from one nursing floor in an older building to two floors in a new structure. This resulted in complaints and supervision issues as nursing managers, who had previously been relatively sedentary, now became quite mobile as they attempted to control nursing operations on two separate floors. Complaints arose from several sources. Nursing staff and managers both complained about the increased difficulty in communicating with each other Physicians expressed frustration to hospital administration at playing "telephone tag" with managers. The solution involved Internet Protocol technology that is in widespread use on most computer networks. The article details how this technology was selected over several other communications technologies and used to implement wireless telephony over the hospital's existing computer network. It reviews key standards and technologies and issues surrounding their use. Finally, the article demonstrates how this computing technology improved patient care by facilitating mobile communications.

  17. Breaching or building social boundaries? : SIDE-effects of computer-mediated communication

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Lea, M

    1998-01-01

    Computer-mediated communication (CMC) is sometimes heralded for its power to break down social boundaries and to liberate individuals from social influence, group pressure, and status and power differentials that characterize much face-to-face interaction. We review research conducted within the fra

  18. PANACEA OR PANOPTICON : THE HIDDEN POWER IN COMPUTER-MEDIATED COMMUNICATION

    NARCIS (Netherlands)

    SPEARS, R; LEA, M

    1994-01-01

    This article examines how interaction by means of computer-mediated communication (CMC) affects the operation of both status differentials and power relations. The authors attempt to provide a corrective to the dominant assessment, particularly within social psychological analyses, that CMC tends to

  19. Effects of a Computer-Based Intervention Program on the Communicative Functions of Children with Autism

    Science.gov (United States)

    Hetzroni, Orit E.; Tannous, Juman

    2004-01-01

    This study investigated the use of computer-based intervention for enhancing communication functions of children with autism. The software program was developed based on daily life activities in the areas of play, food, and hygiene. The following variables were investigated: delayed echolalia, immediate echolalia, irrelevant speech, relevant…

  20. Gender, Group Composition, and Task Type in Small Task Groups Using Computer-Mediated Communication.

    Science.gov (United States)

    Savicki, Victor; And Others

    1996-01-01

    To investigate gender effects on computer-mediated communication, undergraduate psychology students were put in small groups (males, females, or mixed) and were assigned feminine content (decision making) and masculine content (intellective) task types. Groups of females, regardless of task, sent more words per e-mail message, were more satisfied…

  1. Nurturing Students' Problem-Solving Skills and Engagement in Computer-Mediated Communications (CMC)

    Science.gov (United States)

    Chen, Ching-Huei

    2014-01-01

    The present study sought to investigate how to enhance students' well- and ill-structured problem-solving skills and increase productive engagement in computer-mediated communication with the assistance of external prompts, namely procedural and reflection. Thirty-three graduate students were randomly assigned to two conditions: procedural…

  2. Presentation Trainer: What Experts and Computers Can Tell about Your Nonverbal Communication

    Science.gov (United States)

    Schneider, J.; Börner, D.; van Rosmalen, P.; Specht, M.

    2017-01-01

    The ability to present effectively is essential for professionals; therefore, oral communication courses have become part of the curricula for higher education studies. However, speaking in public is still a challenge for many graduates. To tackle this problem, driven by the recent advances in computer vision techniques and prosody analysis,…

  3. Computer Learner Corpora: Analysing Interlanguage Errors in Synchronous and Asynchronous Communication

    Science.gov (United States)

    MacDonald, Penny; Garcia-Carbonell, Amparo; Carot, Sierra, Jose Miguel

    2013-01-01

    This study focuses on the computer-aided analysis of interlanguage errors made by the participants in the telematic simulation IDEELS (Intercultural Dynamics in European Education through on-Line Simulation). The synchronous and asynchronous communication analysed was part of the MiLC Corpus, a multilingual learner corpus of texts written by…

  4. Computer Learner Corpora: Analysing Interlanguage Errors in Synchronous and Asynchronous Communication

    Science.gov (United States)

    MacDonald, Penny; Garcia-Carbonell, Amparo; Carot, Sierra, Jose Miguel

    2013-01-01

    This study focuses on the computer-aided analysis of interlanguage errors made by the participants in the telematic simulation IDEELS (Intercultural Dynamics in European Education through on-Line Simulation). The synchronous and asynchronous communication analysed was part of the MiLC Corpus, a multilingual learner corpus of texts written by…

  5. Computer-Mediated Communication in Education: A Review of Recent Research

    Science.gov (United States)

    Hrastinski, Stefan; Keller, Christina

    2007-01-01

    The field of research on computer-mediated communication (CMC) in education is a relatively new research area. A summary of the latest research is useful to show what methodologies and research topics have been emphasized in order to be better prepared for the future by uncovering areas where there is a lack of research. The study examines…

  6. Musicians Crossing Musical Instrument Gender Stereotypes: A Study of Computer-Mediated Communication

    Science.gov (United States)

    Abeles, Harold F.; Hafeli, Mary; Sears, Colleen

    2014-01-01

    This study examined computer-mediated communication (CMC) -- blogs and responses to YouTube postings -- to better understand how CMCs reflect adolescents' attitudes towards musicians playing instruments that cross gender stereotypes. Employing purposive sampling, we used specific search terms, such as "girl drummer", to identify a…

  7. Computer-Mediated Communication (CMC) in L2 Oral Proficiency Development: A Meta-Analysis

    Science.gov (United States)

    Lin, Huifen

    2015-01-01

    The ever growing interest in the development of foreign or second (L2) oral proficiency in a computer-mediated communication (CMC) classroom has resulted in a large body of studies looking at both the direct and indirect effects of CMC interventions on the acquisition of oral competences. The present study employed a quantitative meta-analytic…

  8. The Provision of Feedback Types to EFL Learners in Synchronous Voice Computer Mediated Communication

    Science.gov (United States)

    Ko, Chao-Jung

    2015-01-01

    This study examined the relationship between Synchronous Voice Computer Mediated Communication (SVCMC) interaction and the use of feedback types, especially pronunciation feedback types, in distance tutoring contexts. The participants, divided into two groups (explicit and recast), were twelve beginning/low-intermediate level English as a Foreign…

  9. Leveraging Computer-Mediated Communication Technologies to Enhance Interactions in Online Learning

    Science.gov (United States)

    Wright, Linda J.

    2011-01-01

    Computer-mediated communication (CMC) technologies have been an integral part of distance education for many years. They are found in both synchronous and asynchronous platforms and are intended to enhance the learning experience for students. CMC technologies add an interactive element to the online learning environment. The findings from this…

  10. Revisiting Synchronous Computer-Mediated Communication: Learner Perception and the Meaning of Corrective Feedback

    Science.gov (United States)

    Kim, Hye Yeong

    2014-01-01

    Effectively exploring the efficacy of synchronous computer-mediated communication (SCMC) for pedagogical purposes can be achieved through the careful investigation of potentially beneficial, inherent attributes of SCMC. This study provides empirical evidence for the capacity of task-based SCMC to draw learner attention to linguistic forms by…

  11. Mutually Beneficial Foreign Language Learning: Creating Meaningful Interactions through Video-Synchronous Computer-Mediated Communication

    Science.gov (United States)

    Kato, Fumie; Spring, Ryan; Mori, Chikako

    2016-01-01

    Providing learners of a foreign language with meaningful opportunities for interactions, specifically with native speakers, is especially challenging for instructors. One way to overcome this obstacle is through video-synchronous computer-mediated communication tools such as Skype software. This study reports quantitative and qualitative data from…

  12. Negotiating Pragmatic Competence in Computer Mediated Communication: The Case of Korean Address Terms

    Science.gov (United States)

    Kim, Eun Young; Brown, Lucien

    2014-01-01

    This paper examines how L2 learners of Korean manifest pragmatic competence in their use of address terms in computer mediated communication (CMC) and how they use these terms to negotiate their identities. Four UK-based learners of Korean with competence levels ranging from Novice High through Intermediate High participated in the study,…

  13. Nurturing Students' Problem-Solving Skills and Engagement in Computer-Mediated Communications (CMC)

    Science.gov (United States)

    Chen, Ching-Huei

    2014-01-01

    The present study sought to investigate how to enhance students' well- and ill-structured problem-solving skills and increase productive engagement in computer-mediated communication with the assistance of external prompts, namely procedural and reflection. Thirty-three graduate students were randomly assigned to two conditions: procedural and…

  14. Individual versus Interactive Task-Based Performance through Voice-Based Computer-Mediated Communication

    Science.gov (United States)

    Granena, Gisela

    2016-01-01

    Interaction is a necessary condition for second language (L2) learning (Long, 1980, 1996). Research in computer-mediated communication has shown that interaction opportunities make learners pay attention to form in a variety of ways that promote L2 learning. This research has mostly investigated text-based rather than voice-based interaction. The…

  15. Undergraduate Taiwanese Students' Perceptions of Using Computer-Mediated Communication in a TOEIC Preparation Course

    Science.gov (United States)

    Tai, Shu-hui April

    2016-01-01

    The aim of this study is to investigate Taiwanese undergraduate students' perception of using computer-mediated communication (CMC) in a TOEIC preparation course and determine if using an online format motivates them to succeed. As a result, five factors are addressed in the study, namely, attitude, motivation, study habit, feedback, and…

  16. Person-Centered Emotional Support and Gender Attributions in Computer-Mediated Communication

    Science.gov (United States)

    Spottswood, Erin L.; Walther, Joseph B.; Holmstrom, Amanda J.; Ellison, Nicole B.

    2013-01-01

    Without physical appearance, identification in computer-mediated communication is relatively ambiguous and may depend on verbal cues such as usernames, content, and/or style. This is important when gender-linked differences exist in the effects of messages, as in emotional support. This study examined gender attribution for online support…

  17. Learners' Perceived Information Overload in Online Learning via Computer-Mediated Communication

    Science.gov (United States)

    Chen, Chun-Ying; Pedersen, Susan; Murphy, Karen L.

    2011-01-01

    Many studies report information overload as one of the main problems that students encounter in online learning via computer-mediated communication. This study aimed to explore the sources of online students' information overload and offer suggestions for increasing students' cognitive resources for learning. Participants were 12 graduate students…

  18. Chinese EFL Teachers' Social Interaction and Socio-Cognitive Presence in Synchronous Computer-Mediated Communication

    Science.gov (United States)

    Wu, Heping; Gao, Junde; Zhang, Weimin

    2014-01-01

    The present study examines the professional growth of three Chinese English teachers by analyzing their interactional patterns and their social and cognitive presence in an online community. The data from social network analysis (SNA) and content analysis revealed that computer-mediated communication (CMC) created new opportunities for teachers to…

  19. Task-Based Oral Computer-Mediated Communication and L2 Vocabulary Acquisition

    Science.gov (United States)

    Yanguas, Inigo

    2012-01-01

    The present study adds to the computer-mediated communication (CMC) literature by exploring oral learner-to-learner interaction using Skype, a free and widely used Internet software program. In particular, this task-based study has a two-fold goal. Firstly, it explores possible differences between two modes of oral CMC (audio and video) and…

  20. 77 FR 28621 - Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and...

    Science.gov (United States)

    2012-05-15

    ... From the Federal Register Online via the Government Publishing Office INTERNATIONAL TRADE COMMISSION Certain Wireless Communication Devices, Portable Music and Data Processing Devices, Computers and Components Thereof; Notice of Request for Statements on the Public Interest AGENCY: U.S. International...