WorldWideScience

Sample records for non-proprietary software entitled

  1. When to make proprietary software open source

    NARCIS (Netherlands)

    Caulkins, J.P.; Feichtinger, G.; Grass, D.; Hartl, R.F.; Kort, P.M.; Seidl, A.

    Software can be distributed closed source (proprietary) or open source (developed collaboratively). While a firm cannot sell open source software, and so loses potential sales revenue, the open source software development process can have a substantial positive impact on the quality of a software,

  2. Contrasting Proprietary and Free/Open Source Game Development

    Directory of Open Access Journals (Sweden)

    Marco Zamarian

    2008-10-01

    Full Text Available Free/Libre Open Source Software (F/LOSS development practices are gaining momentum in the computer game industry. This traditionally proprietary industry is becoming more interested in the F/LOSS paradigm for developing complex software projects. Software practitioners, both managers and developers, need to understand the potential in order to benefit properly from incorporating F/LOSS practices into their proprietary production cycle. Comparisons between proprietary and F/LOSS software development processes are usually characterized in terms of the relationship between property rights, revenue distribution and power within a network of actors. By contrast, coordination and control practices, mediating artifacts and development tools, and the interactions between the different actors involved in the development are often neglected. Proprietary and F/LOSS development differ in terms of the knowledge exchanges between the relevant actors and the different strategies employed to overcome information asymmetries. Recognizing this difference is an essential step for evaluating how proprietary, closed-source software houses can benefit by integrating various F/LOSS practices into their development agenda.

  3. Continued development of a non-proprietary, high-tension, cable end terminal system.

    Science.gov (United States)

    2016-04-29

    A non-proprietary, cable guardrail system is currently under development for the Midwest States Pooled Fund Program. : A cable guardrail end terminal was necessary to accompany the cable guardrail system. The objective of this research : project was ...

  4. A Non-Member Spouse's Entitlement To The Member's Pension Interest

    Directory of Open Access Journals (Sweden)

    Motseotsile Clement Marumoagae

    2014-12-01

    Full Text Available It is important that married couples seek legal advice with regard to the assets falling within their joint estate, more particularly their retirement benefits. This article reflects on the entitlement (if any of non-member spouses to their spouses' retirement fund benefits. Pension benefits can be due before, during or after divorce, and parties to the marriage should be aware of their rights with regard to the accruing pension benefits of their spouses. While it is settled law that non-member spouses are entitled to receive a portion of their member spouses' pension benefits (known as "pension interest" immediately on divorce, it is not particularly clear whether non-member spouses are also entitled to receive the same before or sometime after divorce. In this article I provide a contextual understanding of the entitlements (if any which spouses or former spouses of members of pension funds have on such member spouses' retirement benefits. Furthermore, it shown in this article that various divisions of South African High Courts have been inconsistent in how they have approached the issue of the pension interest between divorcing spouses or divorced ex-spouses.

  5. Improving Software Sustainability: Lessons Learned from Profiles in Science.

    Science.gov (United States)

    Gallagher, Marie E

    2013-01-01

    The Profiles in Science® digital library features digitized surrogates of historical items selected from the archival collections of the U.S. National Library of Medicine as well as collaborating institutions. In addition, it contains a database of descriptive, technical and administrative metadata. It also contains various software components that allow creation of the metadata, management of the digital items, and access to the items and metadata through the Profiles in Science Web site [1]. The choices made building the digital library were designed to maximize the sustainability and long-term survival of all of the components of the digital library [2]. For example, selecting standard and open digital file formats rather than proprietary formats increases the sustainability of the digital files [3]. Correspondingly, using non-proprietary software may improve the sustainability of the software--either through in-house expertise or through the open source community. Limiting our digital library software exclusively to open source software or to software developed in-house has not been feasible. For example, we have used proprietary operating systems, scanning software, a search engine, and office productivity software. We did this when either lack of essential capabilities or the cost-benefit trade-off favored using proprietary software. We also did so knowing that in the future we would need to replace or upgrade some of our proprietary software, analogous to migrating from an obsolete digital file format to a new format as the technological landscape changes. Since our digital library's start in 1998, all of its software has been upgraded or replaced, but the digitized items have not yet required migration to other formats. Technological changes that compelled us to replace proprietary software included the cost of product licensing, product support, incompatibility with other software, prohibited use due to evolving security policies, and product abandonment

  6. Cable-to-post attachments for use in non-proprietary high-tension cable median barrier - phase II.

    Science.gov (United States)

    2016-03-24

    The objective of this study was to reevaluate and improve the existing cable-to-post attachment hardware that is utilized : in the non-proprietary cable barrier being developed at MwRSF. The study focused on redesigning the bolted, tabbed : bracket (...

  7. Languages for Software-Defined Networks

    Science.gov (United States)

    2013-02-01

    switches, firewalls, and middleboxes) with closed and proprietary configuration inter- faces. Software - Defined Networks ( SDN ) are poised to change...how- ever, have seen growing interest in software - defined networks ( SDNs ), in which a logically-centralized controller manages the packet-processing...switches, firewalls, and middleboxes) with closed and proprietary configuration interfaces. Software - Defined Networks ( SDN ) are poised to change this

  8. An Organizational Perspective on Free and Open Source Software Development

    DEFF Research Database (Denmark)

    Vujovic, Sladjana; Ulhøi, John Parm

    2006-01-01

    The traditional model of innovation, the restricted/close source (R/CS) model, is based on proprietary knowledge and private model of production. A fundamental different one, the open source model is based on non-proprietary knowledge and non-economic motives. Moreover, between the two......, there are various combinations or hybrids, in the following referred to as free/open source-based (F/OS-based) agency. In the discussions, practical examples from software production are included. In conclusion, the paper identifies avenues for future research as well as important managerial and policy implications....

  9. Bone histomorphometry using free and commonly available software.

    Science.gov (United States)

    Egan, Kevin P; Brennan, Tracy A; Pignolo, Robert J

    2012-12-01

    Histomorphometric analysis is a widely used technique to assess changes in tissue structure and function. Commercially available programs that measure histomorphometric parameters can be cost-prohibitive. In this study, we compared an inexpensive method of histomorphometry to a current proprietary software program. Image J and Adobe Photoshop(®) were used to measure static and kinetic bone histomorphometric parameters. Photomicrographs of Goldner's trichrome-stained femurs were used to generate black-and-white image masks, representing bone and non-bone tissue, respectively, in Adobe Photoshop(®) . The masks were used to quantify histomorphometric parameters (bone volume, tissue volume, osteoid volume, mineralizing surface and interlabel width) in Image J. The resultant values obtained using Image J and the proprietary software were compared and differences found to be statistically non-significant. The wide-ranging use of histomorphometric analysis for assessing the basic morphology of tissue components makes it important to have affordable and accurate measurement options available for a diverse range of applications. Here we have developed and validated an approach to histomorphometry using commonly and freely available software that is comparable to a much more costly, commercially available software program. © 2012 Blackwell Publishing Limited.

  10. Open Source and Proprietary Project Management Tools for SMEs.

    Directory of Open Access Journals (Sweden)

    Veronika Abramova

    2017-05-01

    Full Text Available The dimensional growth and increasing difficulty in project management promoted the development of different tools that serve to facilitate project management and track project schedule, resources and overall progress. These tools offer a variety of features, from task and time management, up to integrated CRM (Customer Relationship Management and ERP (Enterprise Resource Planning modules. Currently, a large number of project management software is available, to assist project team during the entire project lifecycle. We present the main differences between open source and proprietary project management tools and how those could be important for SMEs, describing the key features and how those can assist the project manager and the development team. In this paper, we analyse four open-source project management tools: OpenProject, ProjectLibre, Redmine, LibrePlan and four proprietary tools: Bitrix24, JIRA, Microsoft Project and Asana.

  11. Functional Testing Protocols for Commercial Building Efficiency Baseline Modeling Software

    Energy Technology Data Exchange (ETDEWEB)

    Jump, David; Price, Phillip N.; Granderson, Jessica; Sohn, Michael

    2013-09-06

    This document describes procedures for testing and validating proprietary baseline energy modeling software accuracy in predicting energy use over the period of interest, such as a month or a year. The procedures are designed according to the methodology used for public domain baselining software in another LBNL report that was (like the present report) prepared for Pacific Gas and Electric Company: ?Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing Protocols? (referred to here as the ?Model Analysis Report?). The test procedure focuses on the quality of the software?s predictions rather than on the specific algorithms used to predict energy use. In this way the software vendor is not required to divulge or share proprietary information about how their software works, while enabling stakeholders to assess its performance.

  12. The role of on-line communication in open source software development

    DEFF Research Database (Denmark)

    Vujovic, S.; Ulhøi, John Parm

    2004-01-01

    allow parallel development and dynamic online exchanges during the overall innovation process. In conceptualizing online computer-based innovation process in the form of Open Source Software, the paper will borrow from theory on networks and communities of practice, which take into account social...... the innovation itself and upstream in the value chain to identifying new supporting services. In closing the paper addresses motivations of companies to integrate this alternative and non-proprietary way of product development into their proprietary business model. We do this by presenting an example....

  13. Usability in open source software development

    DEFF Research Database (Denmark)

    Andreasen, M. S.; Nielsen, H. V.; Schrøder, S. O.

    2006-01-01

    Open Source Software (OSS) development has gained significant importance in the production of soft-ware products. Open Source Software developers have produced systems with a functionality that is competitive with similar proprietary software developed by commercial software organizations. Yet OSS...

  14. Using virtualization to protect the proprietary material science applications in volunteer computing

    Science.gov (United States)

    Khrapov, Nikolay P.; Rozen, Valery V.; Samtsevich, Artem I.; Posypkin, Mikhail A.; Sukhomlin, Vladimir A.; Oganov, Artem R.

    2018-04-01

    USPEX is a world-leading software for computational material design. In essence, USPEX splits simulation into a large number of workunits that can be processed independently. This scheme ideally fits the desktop grid architecture. Workunit processing is done by a simulation package aimed at energy minimization. Many of such packages are proprietary and should be protected from unauthorized access when running on a volunteer PC. In this paper we present an original approach based on virtualization. In a nutshell, the proprietary code and input files are stored in an encrypted folder and run inside a virtual machine image that is also password protected. The paper describes this approach in detail and discusses its application in USPEX@home volunteer project.

  15. Using virtualization to protect the proprietary material science applications in volunteer computing

    Directory of Open Access Journals (Sweden)

    Khrapov Nikolay P.

    2018-04-01

    Full Text Available USPEX is a world-leading software for computational material design. In essence, USPEX splits simulation into a large number of workunits that can be processed independently. This scheme ideally fits the desktop grid architecture. Workunit processing is done by a simulation package aimed at energy minimization. Many of such packages are proprietary and should be protected from unauthorized access when running on a volunteer PC. In this paper we present an original approach based on virtualization. In a nutshell, the proprietary code and input files are stored in an encrypted folder and run inside a virtual machine image that is also password protected. The paper describes this approach in detail and discusses its application in USPEX@home volunteer project.

  16. Commercial Building Energy Baseline Modeling Software: Performance Metrics and Method Testing with Open Source Models and Implications for Proprietary Software Testing

    Energy Technology Data Exchange (ETDEWEB)

    Price, Phillip N.; Granderson, Jessica; Sohn, Michael; Addy, Nathan; Jump, David

    2013-09-01

    The overarching goal of this work is to advance the capabilities of technology evaluators in evaluating the building-level baseline modeling capabilities of Energy Management and Information System (EMIS) software. Through their customer engagement platforms and products, EMIS software products have the potential to produce whole-building energy savings through multiple strategies: building system operation improvements, equipment efficiency upgrades and replacements, and inducement of behavioral change among the occupants and operations personnel. Some offerings may also automate the quantification of whole-building energy savings, relative to a baseline period, using empirical models that relate energy consumption to key influencing parameters, such as ambient weather conditions and building operation schedule. These automated baseline models can be used to streamline the whole-building measurement and verification (M&V) process, and therefore are of critical importance in the context of multi-measure whole-building focused utility efficiency programs. This report documents the findings of a study that was conducted to begin answering critical questions regarding quantification of savings at the whole-building level, and the use of automated and commercial software tools. To evaluate the modeling capabilities of EMIS software particular to the use case of whole-building savings estimation, four research questions were addressed: 1. What is a general methodology that can be used to evaluate baseline model performance, both in terms of a) overall robustness, and b) relative to other models? 2. How can that general methodology be applied to evaluate proprietary models that are embedded in commercial EMIS tools? How might one handle practical issues associated with data security, intellectual property, appropriate testing ‘blinds’, and large data sets? 3. How can buildings be pre-screened to identify those that are the most model-predictable, and therefore those

  17. In praise of open software

    CERN Multimedia

    2000-01-01

    Much scientific software is proprietary and beyond the reach of poorer scientific communities. This issue will become critical as companies build bioinformatics tools for genomics. The principal of open-source software needs to be defended by academic research institutions (1/2 p).

  18. Open source software and minority languages: a priceless opportunity

    Directory of Open Access Journals (Sweden)

    Jordi Mas

    2003-04-01

    Full Text Available Open source software is a form of software that gives its users freedom. With the advent of the Internet, open source software has consolidated as a technically viable, financially sustainable alternative to proprietary software. Languages such as Breton, Galician, Gaelic and Catalan have seen very little development in the world of proprietary software because of the limitations imposed. In contrast, in the world of open source software these languages have been developed with notable success. Open source projects of the importance of the Mozilla browser, the GNOME environment and the GNU/Linux system have complete or partial translations in all these languages. Open source software presents an unprecedented opportunity for the development of minority languages, such as Catalan, in new technologies thanks to the freedom that they guarantee us.

  19. Comparative study on software development methodologies

    OpenAIRE

    Mihai Liviu DESPA

    2014-01-01

    This paper focuses on the current state of knowledge in the field of software development methodologies. It aims to set the stage for the formalization of a software development methodology dedicated to innovation orientated IT projects. The paper starts by depicting specific characteristics in software development project management. Managing software development projects involves techniques and skills that are proprietary to the IT industry. Also the software development project manager han...

  20. MATLAB Software Versions and Licenses for the Peregrine System |

    Science.gov (United States)

    High-Performance Computing | NREL MATLAB Software Versions and Licenses for the Peregrine System MATLAB Software Versions and Licenses for the Peregrine System Learn about the MATLAB software Peregrine is R2017b. Licenses MATLAB is proprietary software. As such, users have access to a limited number

  1. 27 CFR 20.113 - Proprietary solvents general-use formula.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Proprietary solvents... Formulas and Statements of Process General-Use Formulas § 20.113 Proprietary solvents general-use formula. (a) A proprietary solvent is any article made with any other ingredients combined with the...

  2. Entitlement and organizational behaviors: the moderating role of narcissism

    Directory of Open Access Journals (Sweden)

    Agata Szalkowska

    2015-10-01

    Full Text Available Background The purpose of this study was to investigate the relationship between psychological entitlement (active, passive, and revenge, narcissism and two types of organizational behaviors in employees. Interactions between narcissism and psychological entitlement as predictors of organizational citizenship behaviors (OCB and counterproductive work behaviors (CWB were explored. Predictors were analyzed in an effort to determine whether psychological entitlement plays a more destructive role among narcissistic employees than among non-narcissistic ones and whether the effects of narcissism on OCB and CWB are mediated by entitlement. Participants and procedure Data were obtained from 100 employees (34% men aged 22 to 59 years (M = 37.00, SD = 9.30 from public and private companies. Participants were asked to complete the Organizational Citizenship Behavior Scale (OCBS, the Counterproductive Organizational Behaviors Scale (COBS, the Entitlement Questionnaire, and the Narcissistic Personality Inventory (NPI. Results Positive aspects of entitlement were positively associated with OCB only among narcissistic employees, and active entitlement mediated the effects of narcissism on CWB. Active entitlement was negatively related to CWB. Negative aspects of entitlement were negatively related to OCB and unrelated to CWB. Conclusions This study provides evidence for positive (healthy aspects of entitlement for organizations. The unexpected interaction between narcissism and entitlement in predicting higher levels of OCB suggests that among narcissistic employees, healthy aspects of entitlement are desirable and profitable for an organization. Psychological entitlement was observed to be an important predictor of organizational behaviors beyond narcissism itself.

  3. How to establish precise proprietary Chinese medicine in post-marketing reappraisal?

    Directory of Open Access Journals (Sweden)

    Ran Tian

    2017-10-01

    Full Text Available The clinical efficacy and safety of proprietary Chinese medicine has become a more prevailing public health concern. The China Food and Drug Administration has pushed drug companies to conduct post-marketing reappraisal for proprietary Chinese medicine to provide additional evidence supporting the efficacy and safety of these medicine. In this paper, we propose a reappraisal protocol called “precise proprietary Chinese medicine” to precisely i define the therapeutic aim; ii design the protocol; iii control the quality of proprietary Chinese medicine; iv implement the protocol in the trial; v study the mechanism-of-action of the proprietary Chinese medicine and vi describe the indications of the proprietary Chinese medicine. We hope that these steps facilitate the post-marketing reappraisal of proprietary Chinese medicine.

  4. Auctioning payment entitlements

    DEFF Research Database (Denmark)

    Nielsen, Kurt

    2005-01-01

    Payment entitlements is a new commodity that arises from the new European common agricultural policy. The agricultural subsidies are decoupled from the actual production and replaced by the so-called payment entitlements. A payment entitlement has a farm specific value and may be freely traded. T...

  5. The Utility of Open Source Software in Military Systems

    National Research Council Canada - National Science Library

    Esperon, Agustin I; Munoz, Jose P; Tanneau, Jean M

    2005-01-01

    .... The companies involved were THALES and GMV. The MILOS project aimed to demonstrate benefits of Open Source Software in large software based military systems, by casting off constraints inherent to traditional proprietary COTS and by taking...

  6. Proprietary policy and production

    Czech Academy of Sciences Publication Activity Database

    Jeong, Byeongju

    -, č. 287 (2006), s. 1-14 ISSN 1211-3298 Institutional research plan: CEZ:MSM0021620846 Keywords : proprietary regime * direct production * model Subject RIV: AH - Economics http://www.cerge-ei.cz/pdf/wp/Wp287.pdf

  7. MASH TEST NO. 3-10 OF A NON-PROPRIETARY, HIGH-TENSION CABLE MEDIAN BARRIER FOR USE IN 6H:1V V-DITCH (TEST NO. MWP-8)

    Science.gov (United States)

    2017-05-10

    The Midwest States Pooled Fund Program has been developing a prototype design for a non-proprietary, high-tension cable median barrier for use in a 6H:1V V-ditch. This system incorporates four evenly spaced cables, Midwest Weak Posts (MWP) spaced at ...

  8. Attitudes of physicians and pharmacists towards International Non-proprietary Name prescribing in Belgium.

    Science.gov (United States)

    Van Bever, Elien; Elseviers, Monique; Plovie, Marijke; Vandeputte, Lieselot; Van Bortel, Luc; Vander Stichele, Robert

    2015-03-01

    International Non-proprietary Name (INN) prescribing is the use of the name of the active ingredient(s) instead of the brand name for prescribing. In Belgium, INN prescribing began in 2005 and a major policy change occurred in 2012. The aim was to explore the opinions of Dutch-speaking general practitioners (GPs) and pharmacists. An electronic questionnaire with 39 five-point Likert scale statements and one open question was administered in 2013. Multivariate analysis was performed with multiple linear regression on a sum score for benefit statements and for drawback statements. Answers to the open question were qualitatively analysed. We received 745 valid responses with a representable sample for both subgroups. Participants perceived the motives to introduce INN prescribing as purely economic (to reduce pharmaceutical expenditures for the government and the patient). Participants accepted the concept of INN prescribing, but 88% stressed the importance of guaranteed treatment continuity, especially in older, chronic patients, to prevent patient confusion, medication non-adherence and erroneous drug use. In conclusion, the current way in which INN prescribing is applied in Belgium leads to many concerns among primary health professionals about patient confusion and medication adherence. Slightly adapting the current concept of INN prescribing to these concerns can turn INN prescribing into one of the major policies in Belgium to reduce pharmaceutical expenditures and to stimulate rational drug prescribing. © 2014 Nordic Association for the Publication of BCPT (former Nordic Pharmacological Society).

  9. Open source in Finnish software companies

    OpenAIRE

    Seppä, Arto

    2006-01-01

    This paper explores survey data focusing on open source software supply collected from 170 Finnish software firms using descriptive statistical analysis. The first half of the report contains general data about software companies and the differences between proprietary and open source firms. The second half focuses on open source firms. A subject of analysis are copyrights, products and services supply, the firms’ relationships with the open source community, and their views on opportunities ...

  10. 19 CFR 357.111 - Public and proprietary information.

    Science.gov (United States)

    2010-04-01

    ... conspicuously mark in the upper right corner of both versions, the words “proprietary document” or “public... 19 Customs Duties 3 2010-04-01 2010-04-01 false Public and proprietary information. 357.111 Section 357.111 Customs Duties INTERNATIONAL TRADE ADMINISTRATION, DEPARTMENT OF COMMERCE SHORT SUPPLY...

  11. Scilab software as an alternative low-cost computing in solving the linear equations problem

    Science.gov (United States)

    Agus, Fahrul; Haviluddin

    2017-02-01

    Numerical computation packages are widely used both in teaching and research. These packages consist of license (proprietary) and open source software (non-proprietary). One of the reasons to use the package is a complexity of mathematics function (i.e., linear problems). Also, number of variables in a linear or non-linear function has been increased. The aim of this paper was to reflect on key aspects related to the method, didactics and creative praxis in the teaching of linear equations in higher education. If implemented, it could be contribute to a better learning in mathematics area (i.e., solving simultaneous linear equations) that essential for future engineers. The focus of this study was to introduce an additional numerical computation package of Scilab as an alternative low-cost computing programming. In this paper, Scilab software was proposed some activities that related to the mathematical models. In this experiment, four numerical methods such as Gaussian Elimination, Gauss-Jordan, Inverse Matrix, and Lower-Upper Decomposition (LU) have been implemented. The results of this study showed that a routine or procedure in numerical methods have been created and explored by using Scilab procedures. Then, the routine of numerical method that could be as a teaching material course has exploited.

  12. 77 FR 50724 - Developing Software Life Cycle Processes for Digital Computer Software Used in Safety Systems of...

    Science.gov (United States)

    2012-08-22

    ... review of applications for permits and licenses. The DG entitled ``Developing Software Life Cycle... NUCLEAR REGULATORY COMMISSION [NRC-2012-0195] Developing Software Life Cycle Processes for Digital Computer Software Used in Safety Systems of Nuclear Power Plants AGENCY: Nuclear Regulatory Commission...

  13. 48 CFR 1509.505-4 - Obtaining access to proprietary information.

    Science.gov (United States)

    2010-10-01

    ... proprietary information. 1509.505-4 Section 1509.505-4 Federal Acquisition Regulations System ENVIRONMENTAL....505-4 Obtaining access to proprietary information. Contractors gaining access to confidential business... business information. ...

  14. Open source software migration: Best practices

    CSIR Research Space (South Africa)

    Molefe, Onkgopotse M

    2010-09-01

    Full Text Available Open source software (OSS) has gained prominence worldwide, largely due to cost savings and security considerations. This has caused a change in the IT sector and has led to the migration of desktops from proprietary to OSS. The problem...

  15. Semantic Web technologies in software engineering

    OpenAIRE

    Gall, H C; Reif, G

    2008-01-01

    Over the years, the software engineering community has developed various tools to support the specification, development, and maintainance of software. Many of these tools use proprietary data formats to store artifacts which hamper interoperability. However, the Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries. Ontologies are used define the concepts in the domain of discourse and their relationships an...

  16. Software measurement standards for areal surface texture parameters: part 2—comparison of software

    International Nuclear Information System (INIS)

    Harris, P M; Smith, I M; Giusca, C; Leach, R K; Wang, C

    2012-01-01

    A companion paper in this issue describes reference software for the evaluation of areal surface texture parameters, focusing on the definitions of the parameters and giving details of the numerical algorithms employed in the software to implement those definitions. The reference software is used as a benchmark against which software in a measuring instrument can be compared. A data set is used as input to both the software under test and the reference software, and the results delivered by the software under test are compared with those provided by the reference software. This paper presents a comparison of the results returned by the reference software with those reported by proprietary software for surface texture measurement. Differences between the results can be used to identify where algorithms and software for evaluating the parameters differ. They might also be helpful in identifying where parameters are not sufficiently well-defined in standards. (paper)

  17. Disclosure Regulation in Duopoly Markets: Proprietary Costs and Social Welfare

    NARCIS (Netherlands)

    Suijs, J.P.M.; Wielhouwer, J.L.

    2014-01-01

    The argument of proprietary costs is commonly used by firms to object against proposed disclosure regulations. The goal of this paper is to improve our understanding of the welfare consequences of disclosure in duopoly markets and to identify market settings where proprietary costs are a viable

  18. Disclosure regulation in duopoly markets : Proprietary costs and social welfare

    NARCIS (Netherlands)

    Suijs, J.P.M.; Wielhouwer, J.L.

    2014-01-01

    The argument of proprietary costs is commonly used by firms to object against proposed disclosure regulations. The goal of this paper is to improve our understanding of the welfare consequences of disclosure in duopoly markets and to identify market settings where proprietary costs are a viable

  19. Software Review.

    Science.gov (United States)

    McGrath, Diane, Ed.

    1989-01-01

    Reviewed is a computer software package entitled "Audubon Wildlife Adventures: Grizzly Bears" for Apple II and IBM microcomputers. Included are availability, hardware requirements, cost, and a description of the program. The murder-mystery flavor of the program is stressed in this program that focuses on illegal hunting and game…

  20. Protocol independent transmission method in software defined optical network

    Science.gov (United States)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  1. 15 CFR 1160.6 - Proprietary data.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Proprietary data. 1160.6 Section 1160.6 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) TECHNOLOGY ADMINISTRATION, DEPARTMENT OF COMMERCE PRODUCTIVITY, TECHNOLOGY AND INNOVATION Promotion of...

  2. A Perceptual Measure of the Degree of Development of Proprietary Equipment.

    Science.gov (United States)

    Cua, Kristy O.; Junttila, Mikko A.; Schroeder, Roger G.

    2002-01-01

    Evaluated the psychometric properties of a perceptual measure of the extent to which manufacturing organizations develop proprietary equipment, the Proprietary Equipment Scale (developed by the World Class Manufacturing study). Analysis of data from 164 manufacturing plants in 5 countries indicates that although method effects are present, the…

  3. Software licenses: Stay honest!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Do you recall our article about copyright violation in the last issue of the CERN Bulletin, “Music, videos and the risk for CERN”? Now let’s be more precise. “Violating copyright” not only means the illegal download of music and videos, it also applies to software packages and applications.   Users must respect proprietary rights in compliance with the CERN Computing Rules (OC5). Not having legitimately obtained a program or the required licenses to run that software is not a minor offense. It violates CERN rules and puts the Organization at risk! Vendors deserve credit and compensation. Therefore, make sure that you have the right to use their software. In other words, you have bought the software via legitimate channels and use a valid and honestly obtained license. This also applies to “Shareware” and software under open licenses, which might also come with a cost. Usually, only “Freeware” is complete...

  4. 47 CFR 64.2011 - Notification of customer proprietary network information security breaches.

    Science.gov (United States)

    2010-10-01

    ... information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security... criminal investigation or national security, such agency may direct the carrier not to so disclose or...

  5. 47 CFR 76.938 - Proprietary information.

    Science.gov (United States)

    2010-10-01

    ... CABLE TELEVISION SERVICE Cable Rate Regulation § 76.938 Proprietary information. A franchising authority... Form 393 (and/or FCC Forms 1200/1205) filing or a cost-of-service showing. The franchising authority... specifically relates. Upon request to the franchising authority, the parties to a rate proceeding shall have...

  6. 27 CFR 6.27 - Proprietary interest.

    Science.gov (United States)

    2010-04-01

    ... OF THE TREASURY LIQUORS âTIED-HOUSEâ Unlawful Inducements Interest in Retail License § 6.27 Proprietary interest. (a) Complete ownership. Outright ownership of a retail business by an industry member is.... Less than complete ownership of a retail business by an industry member constitutes an interest in a...

  7. 27 CFR 6.33 - Proprietary interest.

    Science.gov (United States)

    2010-04-01

    ... OF THE TREASURY LIQUORS âTIED-HOUSEâ Unlawful Inducements Interest in Retail Property § 6.33 Proprietary interest. (a) Complete ownership. Outright ownership of a retail business by an industry member is.... Less than complete ownership of a retail business by an industry member constitutes an interest in...

  8. Academic entitlement in pharmacy education.

    Science.gov (United States)

    Cain, Jeff; Romanelli, Frank; Smith, Kelly M

    2012-12-12

    The constructs of academic entitlement and student consumerism refer to students' attitudes toward education as a commodity and the underlying belief that as consumers, they should be catered to and given the opportunity to participate in the education process according to their preferences. Most discussions regarding these attitudes are anecdotal, but the pervasiveness of these accounts and the troubling effects that ensue warrant attention. Grade inflation, student incivility, altered classroom practices, and decreased faculty morale are all potential aftereffects of teaching students who hold academic entitlement beliefs. Numerous factors are posited as attributing to academic entitlement including personal issues, societal pressures, and broad academic practices. This paper discusses these factors and offers faculty members and administrators recommendations regarding practices that may curb or alleviate issues associated with academically entitled students.

  9. Free/Libre Open Source Software Implementation in Schools: Evidence from the Field and Implications for the Future

    Science.gov (United States)

    Lin, Yu-Wei; Zini, Enrico

    2008-01-01

    This empirical paper shows how free/libre open source software (FLOSS) contributes to mutual and collaborative learning in an educational environment. Unlike proprietary software, FLOSS allows extensive customisation of software to support the needs of local users better. This also allows users to participate more proactively in the development…

  10. ICSE 2009 Tutorial - Semantic Web Technologies in Software Engineering

    OpenAIRE

    Gall, H C; Reif, G

    2009-01-01

    Over the years, the software engineering community has developed various tools to support the specification, development, and maintainance of software. Many of these tools use proprietary data formats to store artifacts which hamper interoperability. On the other hand, the Semantic Web provides a common framework that allows data to be shared and reused across application, enterprise, and community boundaries. Ontologies are used to define the concepts in the domain of discourse and their rel...

  11. Common Data Acquisition Systems (DAS) Software Development for Rocket Propulsion Test (RPT) Test Facilities

    Science.gov (United States)

    Hebert, Phillip W., Sr.; Davis, Dawn M.; Turowski, Mark P.; Holladay, Wendy T.; Hughes, Mark S.

    2012-01-01

    The advent of the commercial space launch industry and NASA's more recent resumption of operation of Stennis Space Center's large test facilities after thirty years of contractor control resulted in a need for a non-proprietary data acquisition systems (DAS) software to support government and commercial testing. The software is designed for modularity and adaptability to minimize the software development effort for current and future data systems. An additional benefit of the software's architecture is its ability to easily migrate to other testing facilities thus providing future commonality across Stennis. Adapting the software to other Rocket Propulsion Test (RPT) Centers such as MSFC, White Sands, and Plumbrook Station would provide additional commonality and help reduce testing costs for NASA. Ultimately, the software provides the government with unlimited rights and guarantees privacy of data to commercial entities. The project engaged all RPT Centers and NASA's Independent Verification & Validation facility to enhance product quality. The design consists of a translation layer which provides the transparency of the software application layers to underlying hardware regardless of test facility location and a flexible and easily accessible database. This presentation addresses system technical design, issues encountered, and the status of Stennis development and deployment.

  12. Assessing the potential impact of non-proprietary drug copies on quality of medicine and treatment in patients with relapsing multiple sclerosis: the experience with fingolimod

    Directory of Open Access Journals (Sweden)

    Correale J

    2014-06-01

    Full Text Available Jorge Correale,1 Erwin Chiquete,2 Snezana Milojevic,3 Nadina Frider,3 Imre Bajusz31Raúl Carrea Institute for Neurological Research, Foundation for the Fight against Infant Neurological Illnesses, Buenos Aires, Argentina; 2Department of Neurology and Psychiatry, Salvador Zubirán National Institute of Medical Science and Nutrition, Mexico City, Mexico; 3Novartis Pharma AG, Basel, SwitzerlandBackground: Fingolimod is a once-daily oral treatment for relapsing multiple sclerosis, the proprietary production processes of which are tightly controlled, owing to its susceptibility to contamination by impurities, including genotoxic impurities. Many markets produce nonproprietary medicines; assessing their efficacy and safety is difficult as regulators may approve nonproprietary drugs without bioequivalence data, genotoxic evaluation, or risk management plans (RMPs. This assessment is especially important for fingolimod given its solubility/bioavailability profile, genotoxicity risk, and low-dose final product (0.5 mg. This paper presents an evaluation of the quality of proprietary and nonproprietary fingolimod variants.Methods: Proprietary fingolimod was used as a reference substance against which eleven nonproprietary fingolimod copies were assessed. The microparticle size distribution of each compound was assessed by laser light diffraction, and inorganic impurity content by sulfated ash testing. Heavy metals content was quantified using inductively coupled plasma optical emission spectrometry, and levels of unspecified impurities by high-performance liquid chromatography. Solubility was assessed in a range of solvents at different pH values. Key information from the fingolimod RMP is also presented.Results: Nonproprietary fingolimod variants exhibited properties out of proprietary or internationally accepted specifications, including differences in particle size distribution and levels of impurities such as heavy metals. For microparticle size and

  13. Technical Evaluation Report 24: Open Source Software: an alternative to costly Learning Management Systems

    Directory of Open Access Journals (Sweden)

    Jim Depow

    2003-10-01

    Full Text Available This is the first in a series of two reports discussing the use of open source software (OSS and free software (FS in online education as an alternative to expensive proprietary software. It details the steps taken in a Canadian community college to download and install the Linux Operating System in order to support an OSS/ FS learning management system (LMS.

  14. Reproducibility and Practical Adoption of GEOBIA with Open-Source Software in Docker Containers

    Directory of Open Access Journals (Sweden)

    Christian Knoth

    2017-03-01

    Full Text Available Geographic Object-Based Image Analysis (GEOBIA mostly uses proprietary software,but the interest in Free and Open-Source Software (FOSS for GEOBIA is growing. This interest stems not only from cost savings, but also from benefits concerning reproducibility and collaboration. Technical challenges hamper practical reproducibility, especially when multiple software packages are required to conduct an analysis. In this study, we use containerization to package a GEOBIA workflow in a well-defined FOSS environment. We explore the approach using two software stacks to perform an exemplary analysis detecting destruction of buildings in bi-temporal images of a conflict area. The analysis combines feature extraction techniques with segmentation and object-based analysis to detect changes using automatically-defined local reference values and to distinguish disappeared buildings from non-target structures. The resulting workflow is published as FOSS comprising both the model and data in a ready to use Docker image and a user interface for interaction with the containerized workflow. The presented solution advances GEOBIA in the following aspects: higher transparency of methodology; easier reuse and adaption of workflows; better transferability between operating systems; complete description of the software environment; and easy application of workflows by image analysis experts and non-experts. As a result, it promotes not only the reproducibility of GEOBIA, but also its practical adoption.

  15. Software reliability assessment

    International Nuclear Information System (INIS)

    Barnes, M.; Bradley, P.A.; Brewer, M.A.

    1994-01-01

    The increased usage and sophistication of computers applied to real time safety-related systems in the United Kingdom has spurred on the desire to provide a standard framework within which to assess dependable computing systems. Recent accidents and ensuing legislation have acted as a catalyst in this area. One particular aspect of dependable computing systems is that of software, which is usually designed to reduce risk at the system level, but which can increase risk if it is unreliable. Various organizations have recognized the problem of assessing the risk imposed to the system by unreliable software, and have taken initial steps to develop and use such assessment frameworks. This paper relates the approach of Consultancy Services of AEA Technology in developing a framework to assess the risk imposed by unreliable software. In addition, the paper discusses the experiences gained by Consultancy Services in applying the assessment framework to commercial and research projects. The framework is applicable to software used in safety applications, including proprietary software. Although the paper is written with Nuclear Reactor Safety applications in mind, the principles discussed can be applied to safety applications in all industries

  16. 75 FR 61758 - Public Input for the Study Regarding the Implementation of the Prohibitions on Proprietary...

    Science.gov (United States)

    2010-10-06

    ... banking entities from engaging in proprietary trading and from maintaining certain relationships with... the Prohibitions on Proprietary Trading and Certain Relationships With Hedge Funds and Private Equity...-Frank Act, banking entities \\2\\ are prohibited from engaging in proprietary trading and from maintaining...

  17. Digital Preservation in Open-Source Digital Library Software

    Science.gov (United States)

    Madalli, Devika P.; Barve, Sunita; Amin, Saiful

    2012-01-01

    Digital archives and digital library projects are being initiated all over the world for materials of different formats and domains. To organize, store, and retrieve digital content, many libraries as well as archiving centers are using either proprietary or open-source software. While it is accepted that print media can survive for centuries with…

  18. The case for open-source software in drug discovery.

    Science.gov (United States)

    DeLano, Warren L

    2005-02-01

    Widespread adoption of open-source software for network infrastructure, web servers, code development, and operating systems leads one to ask how far it can go. Will "open source" spread broadly, or will it be restricted to niches frequented by hopeful hobbyists and midnight hackers? Here we identify reasons for the success of open-source software and predict how consumers in drug discovery will benefit from new open-source products that address their needs with increased flexibility and in ways complementary to proprietary options.

  19. Comparative study on software development methodologies

    Directory of Open Access Journals (Sweden)

    Mihai Liviu DESPA

    2014-12-01

    Full Text Available This paper focuses on the current state of knowledge in the field of software development methodologies. It aims to set the stage for the formalization of a software development methodology dedicated to innovation orientated IT projects. The paper starts by depicting specific characteristics in software development project management. Managing software development projects involves techniques and skills that are proprietary to the IT industry. Also the software development project manager handles challenges and risks that are predominantly encountered in business and research areas that involve state of the art technology. Conventional software development stages are defined and briefly described. Development stages are the building blocks of any software development methodology so it is important to properly research this aspect. Current software development methodologies are presented. Development stages are defined for every showcased methodology. For each methodology a graphic representation is illustrated in order to better individualize its structure. Software development methodologies are compared by highlighting strengths and weaknesses from the stakeholder's point of view. Conclusions are formulated and a research direction aimed at formalizing a software development methodology dedicated to innovation orientated IT projects is enunciated.

  20. Cyclic Fatigue Resistance of 3 Proprietary Rotary File Brands and their Analogous EdgeEndo Counterparts.

    Science.gov (United States)

    2018-04-26

    Resistance of 3 Proprietary Rotary File Brands and their Analogous EdgeEndo Counterparts. 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Sd...Endodontics 14. ABSTRACT Cyclic Fatigue Resistance of 3 Proprietary Rotary File Brands and their Analogous EdgeEndo Counterparts. David J. Weyh DDS...Resistance of 3 Proprietary Rotary File Brands and their Analogous EdgeEndo Counterparts. David J. Weyh DDS Jarom J. Ray DDS Introduction: The aim of this

  1. Common Data Acquisition Systems (DAS) Software Development for Rocket Propulsion Test (RPT) Test Facilities - A General Overview

    Science.gov (United States)

    Hebert, Phillip W., Sr.; Hughes, Mark S.; Davis, Dawn M.; Turowski, Mark P.; Holladay, Wendy T.; Marshall, PeggL.; Duncan, Michael E.; Morris, Jon A.; Franzl, Richard W.

    2012-01-01

    The advent of the commercial space launch industry and NASA's more recent resumption of operation of Stennis Space Center's large test facilities after thirty years of contractor control resulted in a need for a non-proprietary data acquisition system (DAS) software to support government and commercial testing. The software is designed for modularity and adaptability to minimize the software development effort for current and future data systems. An additional benefit of the software's architecture is its ability to easily migrate to other testing facilities thus providing future commonality across Stennis. Adapting the software to other Rocket Propulsion Test (RPT) Centers such as MSFC, White Sands, and Plumbrook Station would provide additional commonality and help reduce testing costs for NASA. Ultimately, the software provides the government with unlimited rights and guarantees privacy of data to commercial entities. The project engaged all RPT Centers and NASA's Independent Verification & Validation facility to enhance product quality. The design consists of a translation layer which provides the transparency of the software application layers to underlying hardware regardless of test facility location and a flexible and easily accessible database. This presentation addresses system technical design, issues encountered, and the status of Stennis' development and deployment.

  2. Software Piracy in Research: A Moral Analysis.

    Science.gov (United States)

    Santillanes, Gary; Felder, Ryan Marshall

    2015-08-01

    Researchers in virtually every discipline rely on sophisticated proprietary software for their work. However, some researchers are unable to afford the licenses and instead procure the software illegally. We discuss the prohibition of software piracy by intellectual property laws, and argue that the moral basis for the copyright law offers the possibility of cases where software piracy may be morally justified. The ethics codes that scientific institutions abide by are informed by a rule-consequentialist logic: by preserving personal rights to authored works, people able to do so will be incentivized to create. By showing that the law has this rule-consequentialist grounding, we suggest that scientists who blindly adopt their institutional ethics codes will commit themselves to accepting that software piracy could be morally justified, in some cases. We hope that this conclusion will spark debate over important tensions between ethics codes, copyright law, and the underlying moral basis for these regulations. We conclude by offering practical solutions (other than piracy) for researchers.

  3. 42 CFR 31.11 - Persons entitled to treatment.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Persons entitled to treatment. 31.11 Section 31.11... § 31.11 Persons entitled to treatment. To the extent and under the circumstances prescribed in this part, the following persons shall be entitled to medical, surgical, and dental treatment and...

  4. 43 CFR 426.5 - Ownership entitlement.

    Science.gov (United States)

    2010-10-01

    ... nonexempt land; (ii) Married couples who hold equal interests are entitled to receive irrigation water on a... entitled to receive irrigation water on that land owned jointly in marriage up to a maximum of 320 acres of... tenant, provided each tenant holds an equal interest in the tenancy; (vi) Partnerships subject to prior...

  5. 20 CFR 725.219 - Duration of entitlement; child.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Duration of entitlement; child. 725.219... of entitlement; child. (a) An individual is entitled to benefits as a child for each month beginning... month in which any one of the following events first occurs: (1) The child dies; (2) The child marries...

  6. 20 CFR 725.218 - Conditions of entitlement; child.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Conditions of entitlement; child. 725.218... Conditions of entitlement; child. (a) An individual is entitled to benefits where he or she meets the... the child of a deceased miner who: (1) Was receiving benefits under section 415 or part C of title IV...

  7. 20 CFR 410.212 - Conditions of entitlement; child.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Conditions of entitlement; child. 410.212...; Filing of Claims and Evidence § 410.212 Conditions of entitlement; child. (a) An individual is entitled to benefits if such individual: (1) Is the child or stepchild (see § 410.330) of (i) a deceased miner...

  8. 20 CFR 410.213 - Duration of entitlement; child.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Duration of entitlement; child. 410.213...; Filing of Claims and Evidence § 410.213 Duration of entitlement; child. (a) An individual is entitled to benefits as a child for each month beginning with the first month in which all of the conditions of...

  9. Academic and Non-Profit Accessibility to Commercial Remote Sensing Software

    Science.gov (United States)

    O'Connor, A. S.; Farr, B.

    2013-12-01

    Remote Sensing as a topic of teaching and research at the university and college level continues to increase. As more data is made freely available and software becomes easier to use, more and more academic and non-profits institutions are turning to remote sensing to solve their tough and large spatial scale problems. Exelis Visual Information Solutions (VIS) has been supporting teaching and research endeavors for over 30 years with a special emphasis over the last 5 years with scientifically proven software and accessible training materials. The Exelis VIS academic program extends to US and Canadian 2 year and 4 year colleges and universities with tools for analyzing aerial and satellite multispectral and hyperspectral imagery, airborne LiDAR and Synthetic Aperture Radar. The Exelis VIS academic programs, using the ENVI Platform, enables labs and classrooms to be outfitted with software and makes software accessible to students. The ENVI software provides students hands on experience with remote sensing software, an easy teaching platform for professors and allows researchers scientifically vetted software they can trust. Training materials are provided at no additional cost and can either serve as a basis for course curriculum development or self paced learning. Non-profit organizations like The Nature Conservancy (TNC) and CGIAR have deployed ENVI and IDL enterprise wide licensing allowing researchers all over the world to have cost effective access COTS software for their research. Exelis VIS has also contributed licenses to the NASA DEVELOP program. Exelis VIS is committed to supporting the academic and NGO community with affordable enterprise licensing, access to training materials, and technical expertise to help researchers tackle today's Earth and Planetary science big data challenges.

  10. Academic Entitlement and Academic Performance in Graduating Pharmacy Students

    OpenAIRE

    Jeffres, Meghan N.; Barclay, Sean M.; Stolte, Scott K.

    2014-01-01

    Objectives. To determine a measurable definition of academic entitlement, measure academic entitlement in graduating doctor of pharmacy (PharmD) students, and compare the academic performance between students identified as more or less academically entitled.

  11. Teaching Rational Entitlement and Responsibility: A Socratic Exercise

    Directory of Open Access Journals (Sweden)

    David Godden

    2014-02-01

    Full Text Available The paper reports on a Socratic exercise that introduces participants to the norm of rational entitlement, as distinct from political entitlement, and the attendant norm of rational responsibility. The exercise demonstrates that, because participants are not willing to exchange their own opinion at random for another differing opinion to which the owner is, by the participants’ own admission, entitled, they treat their entitlement to their own opinion differently, giving it a special status. This gives rise to rational obligations such as the obligation to provide reasons, and a willingness to risk those opinions to the force of the better reason.

  12. Strengthening Software Authentication with the ROSE Software Suite

    International Nuclear Information System (INIS)

    White, G

    2006-01-01

    Many recent nonproliferation and arms control software projects include a software authentication regime. These include U.S. Government-sponsored projects both in the United States and in the Russian Federation (RF). This trend toward requiring software authentication is only accelerating. Demonstrating assurance that software performs as expected without hidden ''backdoors'' is crucial to a project's success. In this context, ''authentication'' is defined as determining that a software package performs only its intended purpose and performs said purpose correctly and reliably over the planned duration of an agreement. In addition to visual inspections by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs, both to aid visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary and not extensible. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool has to be based on a complete language compiler. ROSE is precisely such a compiler infrastructure developed within the Department of Energy (DOE) and targeted at the optimization of scientific applications and user-defined libraries within large-scale applications (typically applications of a million lines of code). ROSE is a robust, source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C and C++ (handling the full C, C99, C++ languages and with current collaborations to support Fortran90). We propose to extend ROSE to address a number of security-specific requirements, and apply it to software authentication for nonproliferation and arms control projects

  13. Protection of proprietary rights of DIN standards in connection with statutory and administrative provisions

    International Nuclear Information System (INIS)

    Katzenberger, P.

    1985-01-01

    On the basis of contracts entered with the German Institute of Standardization (DIN), the state bodies and authorities tend to refer to Din standards in many ways when issuing statutory or administrative provisions. Some Din standards are also printed in official publications- with or without Din's prior consent. Such common practice leads to the question whether the Din standards which on pinciple meet the general requirements made on the protection of proprietary rights are losing this protection by the fact that official publications are exempt from the protection of proprietary rights (Art.5 UrhG). The author points out that the thorough analysis of the legal position in terms of interests, proprietary rights and constitution indicated that this is not, in principle, the case. (orig.) [de

  14. Personality, Self-Regulated Learning, and Academic Entitlement

    Science.gov (United States)

    McLellan, Chelsea K.; Jackson, Dennis L.

    2017-01-01

    The current study explored the relation between the Big-Five personality domains, self-regulated learning, and academic entitlement. Academic entitlement is defined as the tendency to possess expectations of unearned academic success, unearned/undeserved academic services, and/or the expectation of unrealistic accommodation (Chowning and Campbell…

  15. Buying in to bioinformatics: an introduction to commercial sequence analysis software.

    Science.gov (United States)

    Smith, David Roy

    2015-07-01

    Advancements in high-throughput nucleotide sequencing techniques have brought with them state-of-the-art bioinformatics programs and software packages. Given the importance of molecular sequence data in contemporary life science research, these software suites are becoming an essential component of many labs and classrooms, and as such are frequently designed for non-computer specialists and marketed as one-stop bioinformatics toolkits. Although beautifully designed and powerful, user-friendly bioinformatics packages can be expensive and, as more arrive on the market each year, it can be difficult for researchers, teachers and students to choose the right software for their needs, especially if they do not have a bioinformatics background. This review highlights some of the currently available and most popular commercial bioinformatics packages, discussing their prices, usability, features and suitability for teaching. Although several commercial bioinformatics programs are arguably overpriced and overhyped, many are well designed, sophisticated and, in my opinion, worth the investment. If you are just beginning your foray into molecular sequence analysis or an experienced genomicist, I encourage you to explore proprietary software bundles. They have the potential to streamline your research, increase your productivity, energize your classroom and, if anything, add a bit of zest to the often dry detached world of bioinformatics. © The Author 2014. Published by Oxford University Press.

  16. Regulation of proprietary traditional Chinese medicines in Australia.

    Science.gov (United States)

    Graham, David T

    2017-01-01

    This review article describes the regulation of proprietary Chinese medicines for the Australian market, which may permit many medicines used in Traditional Chinese Medicine to have a simplified process of market access provided that certain criteria for acceptable public safety are met. Copyright © 2017 China Pharmaceutical University. Published by Elsevier B.V. All rights reserved.

  17. Proprietary and voluntary home care agency evolution: the emergence of a new entity.

    Science.gov (United States)

    Balinsky, W; Shames, J N

    1985-01-01

    The objective of this paper is to document that the delivery of home care services and the corresponding ways in which they are marketed are evolving in both proprietary and voluntary providers. This evolution is producing the emergency of a new entity. In order to examine the present state, it is necessary to review the general history of the development of both voluntary (not-for-profit) and proprietary home health services. Then, an analysis of present conditions will show that these two forms of ownership are changing in ways that are making them more alike than different. This situation is leading to more intense competition for an expanding and diverse mix of home services. Program content and corresponding marketing techniques have crossed the industry's traditional lines blending into a wide array of services being offered by both voluntary and proprietary organizations. Despite their many shared goals and objectives, home care agencies still differ in their underlying philosophy which is based at least in part on their past.

  18. Data collection procedures for the Software Engineering Laboratory (SEL) database

    Science.gov (United States)

    Heller, Gerard; Valett, Jon; Wild, Mary

    1992-01-01

    This document is a guidebook to collecting software engineering data on software development and maintenance efforts, as practiced in the Software Engineering Laboratory (SEL). It supersedes the document entitled Data Collection Procedures for the Rehosted SEL Database, number SEL-87-008 in the SEL series, which was published in October 1987. It presents procedures to be followed on software development and maintenance projects in the Flight Dynamics Division (FDD) of Goddard Space Flight Center (GSFC) for collecting data in support of SEL software engineering research activities. These procedures include detailed instructions for the completion and submission of SEL data collection forms.

  19. 20 CFR 410.214 - Conditions of entitlement; parent, brother, or sister.

    Science.gov (United States)

    2010-04-01

    ... entitlement to brother's benefits may be established for any month before January 1973, based on a disability... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Conditions of entitlement; parent, brother...; Duration of Entitlement; Filing of Claims and Evidence § 410.214 Conditions of entitlement; parent, brother...

  20. Original article Entitlement and subjective well-being: a three-nations study

    Directory of Open Access Journals (Sweden)

    Magdalena Żemojtel-Piotrowska

    2015-03-01

    Full Text Available Background The current study investigated the role of three facets of entitlement (active, passive and revenge in various forms of subjective well-being (SWB: hedonistic and two facets of eudaimonic well-being (social and psychological. Social well-being was based on Keyes’ model (1998 and psychological well-being on Ryff’s model (1989. Participants and procedure The study was performed in three nations (Poland, Puerto Rico and Vietnam on student samples (Poland, n = 245, Vietnam, n = 115, and Puerto Rico, n = 300. To assess entitlement level the Entitlement Questionnaire was used. The level of hedonistic well-being was measured with the Satisfaction with Life Scale (SWLS and the Positive and Negative Affect Schedule (PANAS, and eudaimonic well-being by the Mental Health Continuum–Short Form (MHC-SF. Results Active entitlement was positively related to all aspects of SWB. Revenge entitlement was negatively related to hedonistic and psychological SWB in all samples and negatively related to social well-being only in Poland. Passive entitlement was unrelated to SWB. Conclusions The current study shows cross-cultural similarities in relationships of entitlement with hedonistic and psychological well-being and cross-cultural differences in the relationship of entitlement with social well-being. Additionally, the study indicates positive meaning of healthy aspects of entitlement for subjective well-being and negative meaning of dysfunctional aspects of entitlement for subjective well-being.

  1. Building a Snow Data Management System using Open Source Software (and IDL)

    Science.gov (United States)

    Goodale, C. E.; Mattmann, C. A.; Ramirez, P.; Hart, A. F.; Painter, T.; Zimdars, P. A.; Bryant, A.; Brodzik, M.; Skiles, M.; Seidel, F. C.; Rittger, K. E.

    2012-12-01

    At NASA's Jet Propulsion Laboratory free and open source software is used everyday to support a wide range of projects, from planetary to climate to research and development. In this abstract I will discuss the key role that open source software has played in building a robust science data processing pipeline for snow hydrology research, and how the system is also able to leverage programs written in IDL, making JPL's Snow Data System a hybrid of open source and proprietary software. Main Points: - The Design of the Snow Data System (illustrate how the collection of sub-systems are combined to create a complete data processing pipeline) - Discuss the Challenges of moving from a single algorithm on a laptop, to running 100's of parallel algorithms on a cluster of servers (lesson's learned) - Code changes - Software license related challenges - Storage Requirements - System Evolution (from data archiving, to data processing, to data on a map, to near-real-time products and maps) - Road map for the next 6 months (including how easily we re-used the snowDS code base to support the Airborne Snow Observatory Mission) Software in Use and their Software Licenses: IDL - Used for pre and post processing of data. Licensed under a proprietary software license held by Excelis. Apache OODT - Used for data management and workflow processing. Licensed under the Apache License Version 2. GDAL - Geospatial Data processing library used for data re-projection currently. Licensed under the X/MIT license. GeoServer - WMS Server. Licensed under the General Public License Version 2.0 Leaflet.js - Javascript web mapping library. Licensed under the Berkeley Software Distribution License. Python - Glue code and miscellaneous data processing support. Licensed under the Python Software Foundation License. Perl - Script wrapper for running the SCAG algorithm. Licensed under the General Public License Version 3. PHP - Front-end web application programming. Licensed under the PHP License Version

  2. Process for planning and control of software projects using XedroGESPRO

    OpenAIRE

    Jacqueline Marín-Sánchez; José Alejandro Lugo-García; Pedro Yobanis Piñero-Pérez; Alena María Santiesteban-García; Félix Noel Abelardo-Santana; Javier Menéndez-Rizo

    2014-01-01

    The software project management in Cuba has become a key area for improving production processes and decisionmaking in organizations. Several models and standards for process improvement, related with project management, proposed best practices on issues of planning and control of projects. However, they are generic guidelines that describe only those activities to execute, leaving the responsibility for implementing to organizations, using sometimes , expensive proprietary infor...

  3. Technical Evaluation Report 25: Open Source Software: Two learning management systems

    Directory of Open Access Journals (Sweden)

    Jim Depow

    2003-10-01

    Full Text Available This report is the second in a two-part series about open source (OSS and free software (FS systems in online education. These are rapidly emerging as alternatives to costly proprietary learning management systems (LMS and content management systems (CMS. This report reviews two LMS systems and one CMS system, all developed on the OSS/ FS principle and available to users free of charge.

  4. Measurement of Psychological Entitlement in 28 Countries

    Czech Academy of Sciences Publication Activity Database

    Żemojtel-Piotrowska, M.; Piotrowski, J.; Cieciuch, J.; Calogero, R.M.; Van Hiel, A.; Argentero, P.; Baltatescu, S.; Baran, T.; Bardhwaj, G.; Bukowski, M.; Chargazia, M.; Clinton, A.; Halik, M.H.; Ilisko, D.; Khachatryan, N.; Klicperová-Baker, Martina; Košťál, Jaroslav; Kovacs, M.; Letovancova, E.; Liik, K.; Marganski, A.; Michałowski, J.; Nord, I.; Paspalanova, E.; de Leon, P.P.; Techera, J.; Rojas, M.; Różycka, J.; Sawicka, A.; Seibt, B.; Semkiv, I.; Tiliouine, H.; Truong, H.K.; Van den Bos, K.; Wills-Herrera, E.

    2017-01-01

    Roč. 33, č. 3 (2017), s. 207-217 ISSN 1015-5759 R&D Projects: GA ČR GA15-11062S Institutional support: RVO:68081740 Keywords : psychological entitlement * Entitlement Attitudes Questionnaire * cross-cultural research * measurement invariance Subject RIV: AN - Psychology OBOR OECD: Psychology (including human - machine relations) Impact factor: 2.328, year: 2016 http://econtent.hogrefe.com/doi/abs/10.1027/1015-5759/a000286

  5. Change Strategies Used by a Proprietary School: The Dale Carnegie Organization.

    Science.gov (United States)

    Mackey, Paul J.

    1983-01-01

    Discusses recent developments regarding proprietary schools: recognition by accrediting associations, increased federal aid, and increased need for the specific training offered by these schools. Uses the Dale Carnegie organization as an example. (JOW)

  6. Academic Entitlement in the Context of Learning Styles

    Science.gov (United States)

    Andrey, Jean; Joakim, Erin; Schoner, Vivian; Hambly, Derrick; Silver, Amber; Jayasundera, Rohan; Nelson, Allen

    2012-01-01

    This study explores the linkages between students' sense of entitlement and their approaches to learning, based on survey research at a large public university in Canada. Through literature review and pilot testing, a questionnaire instrument was developed that measures four constructs: academic entitlement, deep learning, surface learning and…

  7. Proprietary, standard, and government-supported nuclear data bases

    International Nuclear Information System (INIS)

    Poncelet, C.G.; Ozer, O.; Harris, D.R.

    1975-07-01

    This study presents an assessment of the complex situation surrounding nuclear data bases for nuclear power technology. Requirements for nuclear data bases are identified as regards engineering functions and system applications for the many and various user groups that rely on nuclear data bases. Current practices in the development and generation of nuclear data sets are described, and the competitive aspect of design nuclear data set development is noted. The past and current role of the federal government in nuclear data base development is reviewed, and the relative merits of continued government involvement are explored. National policies of the United States and other industrial countries regarding the availability of nationally supported nuclear data information are reviewed. Current proprietary policies of reactor vendors regarding design library data sets are discussed along with the basis for such proprietary policies. The legal aspects of protective policies are explored as are their impacts on the nuclear power industry as a whole. The effect of the regulatory process on the availability and documentation of nuclear data bases is examined. Current nuclear data standard developments are reviewed, including a discussion of the standard preparation process. Standards currently proposed or in preparation that directly relate to nuclear data bases are discussed in some detail. (auth)

  8. 42 CFR 31.2 - Persons entitled to treatment.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Persons entitled to treatment. 31.2 Section 31.2... Public Health Service § 31.2 Persons entitled to treatment. To the extent and under the circumstances... treatment and hospitalization by the Service: (a) Coast Guard. (1) Commissioned officers, chief warrant...

  9. Feasibility study for the redesign of MDOT's pavement management systems software.

    Science.gov (United States)

    2011-04-01

    In August of 2006 the Mississippi Department of Transportation (MDOT) initiated State Study No. 191, entitled Feasibility : Study for the Redesign of MDOTs Pavement Management System (PMS) Software. At the initiation of this study, the : Dep...

  10. Application software profiles 2010

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-04-15

    This article presented information on new software applications designed to facilitate petroleum exploration, drilling and production activities. Computer modelling and analysis enables oil and gas producers to characterize reservoirs, estimate reserves forecast production, plan operations and manage assets. Seven Calgary-based organizations were highlighted along with their sophisticated software tools, the applications and the new features available in each product. The geoSCOUT version 7.7 by GeoLOGIC Systems Ltd. integrates public and proprietary data on wells, well logs, reserves, pipelines, production, ownership and seismic location data. The Value Navigator and AFE Navigator by Energy Navigator provides control over reserves, production and cash flow forecasting. FAST Harmony, FAST Evolution, FAST CBM, FAST FieldNotes, Fast Piper, FAST RTA, FAST VirtuWell and FAST WellTest by Fekete Associates Inc. provide reserve evaluations for reservoir engineering projects and production data analysis. The esi.manage software program by 3esi improves business results for upstream oil and gas companies through enhanced decision making and workforce effectiveness. WELLFLO, PIPEFLO, FORGAS, OLGA, Drillbench, and MEPO wellbore solutions by Neotec provide unique platforms for flow simulation to optimize oil and gas production systems. Petrel, ECLIPSE, Avocet, PipeSim and Merak software tools by Schlumberger Information Solutions are petroleum systems modelling tools for geologic mapping, visualization modelling and reservoir engineering. StudioSL by Streamsim Technologies Inc. is a modelling tool for optimizing flood management. figs.

  11. Towards an Early Software Effort Estimation Based on Functional and Non-Functional Requirements

    NARCIS (Netherlands)

    Kassab, M.; Daneva, Maia; Ormanjieva, Olga; Abran, A.; Braungarten, R.; Dumke, R.; Cuadrado-Gallego, J.; Brunekreef, J.

    2009-01-01

    The increased awareness of the non-functional requirements as a key to software project and product success makes explicit the need to include them in any software project effort estimation activity. However, the existing approaches to defining size-based effort relationships still pay insufficient

  12. Space-Based Reconfigurable Software Defined Radio Test Bed Aboard International Space Station

    Science.gov (United States)

    Reinhart, Richard C.; Lux, James P.

    2014-01-01

    The National Aeronautical and Space Administration (NASA) recently launched a new software defined radio research test bed to the International Space Station. The test bed, sponsored by the Space Communications and Navigation (SCaN) Office within NASA is referred to as the SCaN Testbed. The SCaN Testbed is a highly capable communications system, composed of three software defined radios, integrated into a flight system, and mounted to the truss of the International Space Station. Software defined radios offer the future promise of in-flight reconfigurability, autonomy, and eventually cognitive operation. The adoption of software defined radios offers space missions a new way to develop and operate space transceivers for communications and navigation. Reconfigurable or software defined radios with communications and navigation functions implemented in software or VHDL (Very High Speed Hardware Description Language) provide the capability to change the functionality of the radio during development or after launch. The ability to change the operating characteristics of a radio through software once deployed to space offers the flexibility to adapt to new science opportunities, recover from anomalies within the science payload or communication system, and potentially reduce development cost and risk by adapting generic space platforms to meet specific mission requirements. The software defined radios on the SCaN Testbed are each compliant to NASA's Space Telecommunications Radio System (STRS) Architecture. The STRS Architecture is an open, non-proprietary architecture that defines interfaces for the connections between radio components. It provides an operating environment to abstract the communication waveform application from the underlying platform specific hardware such as digital-to-analog converters, analog-to-digital converters, oscillators, RF attenuators, automatic gain control circuits, FPGAs, general-purpose processors, etc. and the interconnections among

  13. Information governance and security protecting and managing your company's proprietary information

    CERN Document Server

    Iannarelli, John G

    2014-01-01

    Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization's most important asset-its proprietary information-safe from cyber and physical compromise. Many intrusions can be prevented if appropriate precautions are taken, and this book establishes the enterprise-level systems and disciplines necessary for managing all the information generated by an organization. In addition, the book encompasses the human element by considering proprietary information lost, damaged, or destroyed through negligence. By implementing the policies and procedures outlined in Information Governance and Security, organizations can proactively protect their reputation against the threats that most managers have never even thought of. Provides a step-by-step outline for developing an information governance policy that is appropriate for your organization Includes real-world examples and cases to help illustrate key ...

  14. Academic Entitlement: Relations to Perceptions of Parental Warmth and Psychological Control

    Science.gov (United States)

    Turner, Lisa A.; McCormick, Wesley H.

    2018-01-01

    Academic entitlement characterises students who expect positive academic outcomes without personal effort. The current study examined the relations of perceived parental warmth and parental psychological control with two dimensions of academic entitlement (i.e., entitled expectations and externalised responsibility) among college students.…

  15. The influence of temporary differences between accounting and tax revenues, proprietary costs and liquidity on profit growth

    Directory of Open Access Journals (Sweden)

    NURAMALIA HASANAH

    2017-07-01

    Full Text Available This study aimed to examine the influence of temporary differences between accounting profit and tax, proprietary costs, and Liquidity toward earnings growth of the companies listed in Indonesia Stock Exchange (IDX 2011-2012. The factors examined in this study are temporary differences between accounting profit and tax, proprietary costs, and liquidity as an independent variable, while earnings growth has the dependent variable. This study used a descriptive quantitative method using secondary data and the number of samples collected was thirty- eight (38 that have met the criteria the researchers used purposive sampling. From the data that has been collected and then processed and analyzed using multiple regression analysis with a significance level of 0.05. This research proves temporary differences between accounting profit and tax has no significant influence on earnings growth, proprietary cost has no significant influence on earnings growth, and liquidity has negatively significant influence earnings growth. Temporary differences between accounting profit and tax, proprietary costs, and liquidity together or simultaneously significant influence toward the earnings growth.

  16. Proprietary software versus Open Source Software for Education

    OpenAIRE

    N. Pankaja

    2013-01-01

    The Internet has brought learning "online" and offers many advantages. It is convenient, available at any time of the day, and can be accessed nearly anywhere in the world. Recently, Cloud computing is all the rage. E-Learning offers tremendous potential to increase the availability and convenience of education. Today, online content is varied and can include: text on a website, digital audio, digital video, animated images, and virtual reality environments. This content can be created in a v...

  17. Verification and validation of software related to nuclear power plant control and instrumentation

    International Nuclear Information System (INIS)

    Wall, N.; Kossilov, A.

    1994-01-01

    There has always been significant concern with introduction of software in industry and the nuclear industry is no different from any other sector save its safety demands are some of the most onerous. The problems associated with software have led to the well documented difficulties in the introduction of computer based systems. An important area of concern with software in systems is the processes of Verification and Validation. One of the many activities the IAEA is currently engaged in is the preparation of a document on the process of verification and validation of software. The document follows the safety classification of IEC 1226 but includes software important to plant operation to establish three levels of assurance. The software that might be deployed on a plant was then identified as one of four types: new software, existing software for which full access to the code and documentation is possible, existing software of a proprietary nature and finally configurable software. The document attempts to identify the appropriate methods and tools for conducting the verification and validation processes. (author). 5 refs, 5 figs, 7 tabs

  18. Regulatory control of Chinese Proprietary Medicines in Singapore.

    Science.gov (United States)

    Yee, Shen-Kuan; Chu, Swee-Seng; Xu, Yi-Min; Choo, Peck-Lin

    2005-02-01

    In Singapore, there has been a growing public interest in traditional Chinese medicine (TCM), which plays an important role in the healthcare system. With effect from 1 September 1999, the control on Chinese Proprietary Medicines (CPM) was implemented in three phases over a span of 3 years. Under the CPM regulatory framework, CPM importers, wholesalers, manufacturers and re-packers must be licensed and CPM products assessed and listed by the health authority before they are allowed for sale. Product assessment is based on the criteria of safety and quality which include limits of toxic heavy metals and microbial contents. During the 3-year CPM listing exercise, irregularities were detected, including intrinsic toxicity, adulteration, substitution, contamination, misidentification, non-traditional and/or inappropriate usage, incorrect preparation, inappropriate labelling, exaggerated claims and/or advertising. The full implementation of CPM control by September 2001 saw the listing of 7943 CPM products and brought about an improvement in the quality and safety of CPM in Singapore as well as the removal of sub-standard, fake/imitation and adulterated products. The standards of practices by local CPM dealers have also been raised. These improvements have, in turn, increased the level of public confidence in CPM products in Singapore.

  19. WILDFIRE IGNITION RESISTANCE ESTIMATOR WIZARD SOFTWARE DEVELOPMENT REPORT

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, M.; Robinson, C.; Gupta, N.; Werth, D.

    2012-10-10

    This report describes the development of a software tool, entitled “WildFire Ignition Resistance Estimator Wizard” (WildFIRE Wizard, Version 2.10). This software was developed within the Wildfire Ignition Resistant Home Design (WIRHD) program, sponsored by the U. S. Department of Homeland Security, Science and Technology Directorate, Infrastructure Protection & Disaster Management Division. WildFIRE Wizard is a tool that enables homeowners to take preventive actions that will reduce their home’s vulnerability to wildfire ignition sources (i.e., embers, radiant heat, and direct flame impingement) well in advance of a wildfire event. This report describes the development of the software, its operation, its technical basis and calculations, and steps taken to verify its performance.

  20. Non-intrusive Instance Level Software Composition

    NARCIS (Netherlands)

    Hatun, Kardelen

    2014-01-01

    A software system is comprised of parts, which interact through shared interfaces. Certain qualities of integration, such as loose-coupling, requiring minimal changes to the software and fine-grained localisation of dependencies, have impact on the overall software quality. Current general-purpose

  1. Lessons learned from development and quality assurance of software systems at the Halden Project

    International Nuclear Information System (INIS)

    Bjorlo, T.J.; Berg, O.; Pehrsen, M.; Dahll, G.; Sivertsen, T.

    1996-01-01

    The OECD Halden Reactor Project has developed a number of software systems within the research programmes. These programmes have comprised a wide range of topics, like studies of software for safety-critical applications, development of different operator support systems, and software systems for building and implementing graphical user interfaces. The systems have ranged from simple prototypes to installations in process plants. In the development of these software systems, Halden has gained much experience in quality assurance of different types of software. This paper summarises the accumulated experience at the Halden Project in quality assurance of software systems. The different software systems being developed at the Halden Project may be grouped into three categories. These are plant-specific software systems (one-of-a-kind deliveries), generic software products, and safety-critical software systems. This classification has been found convenient as the categories have different requirements to the quality assurance process. In addition, the experience from use of software development tools and proprietary software systems at Halden, is addressed. The paper also focuses on the experience gained from the complete software life cycle, starting with the software planning phase and ending with software operation and maintenance

  2. 19 CFR 356.10 - Procedures for obtaining access to proprietary information.

    Science.gov (United States)

    2010-04-01

    ... secretary if such person: (i) Is not involved in competitive decision-making for a participant in the panel review or for any person that would gain competitive advantage through knowledge of the proprietary... and each copy as the first page of the document. (4) Service of applications—(i) Persons described in...

  3. Towards an Early Software Effort Estimation Based on Functional and Non-Functional Requirements

    Science.gov (United States)

    Kassab, Mohamed; Daneva, Maya; Ormandjieva, Olga

    The increased awareness of the non-functional requirements as a key to software project and product success makes explicit the need to include them in any software project effort estimation activity. However, the existing approaches to defining size-based effort relationships still pay insufficient attention to this need. This paper presents a flexible, yet systematic approach to the early requirements-based effort estimation, based on Non-Functional Requirements ontology. It complementarily uses one standard functional size measurement model and a linear regression technique. We report on a case study which illustrates the application of our solution approach in context and also helps evaluate our experiences in using it.

  4. The Growth of open source: A look at how companies are utilizing open source software in their business models

    OpenAIRE

    Feare, David

    2009-01-01

    This paper examines how open source software is being incorporated into the business models of companies in the software industry. The goal is to answer the question of whether the open source model can help sustain economic growth. While some companies are able to maintain a "pure" open source approach with their business model, the reality is that most companies are relying on proprietary add-on value in order to generate revenue because open source itself is simply not big business. Ultima...

  5. 20 CFR 408.816 - When does SVB entitlement end due to death?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When does SVB entitlement end due to death? 408.816 Section 408.816 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Suspensions and Terminations Termination § 408.816 When does SVB entitlement end due to death? Your SVB entitlement ends wit...

  6. Entitlement to vote in the Canton of Geneva and entitlement to vote and eligibility for election in the Canton of Vaud

    CERN Multimedia

    DG Unit

    2011-01-01

    You are reminded that, at commune level, certain international civil servants and their family members: are entitled to vote in the Canton of Geneva are entitled to vote and are eligible for election in the Canton of Vaud. For further information, in particular regarding the special procedure to be followed to apply to exercise these entitlements, you are invited to consult the information published, in French only, on the Swiss Mission’s website (topic « Privileges and immunities (Manual) » : http://www.eda.admin.ch/eda/fr/home/topics/intorg/un/unge/gepri/manvot/manvt1.html (for the Canton of Geneva), http://www.eda.admin.ch/eda/fr/home/topics/intorg/un/unge/gepri/manvot/manvt2.html (for the Canton of Vaud). The dates of the forthcoming ballots are available on the official websites of the cantonal administrative authorities : for Geneva: http://www.ge.ch/votations-elections/prochains-scrutins/; for Vaud: http://www.vd.ch/fr/themes/etat-droit-financ...

  7. Entitlement to vote in the Canton of Geneva and entitlement to vote and eligibility for election in the Canton of Vaud

    CERN Multimedia

    DG Unit

    2009-01-01

    You are reminded that, at commune level, certain international civil servants and their family members: are entitled to vote in the Canton of Geneva are entitled to vote and are eligible for election in the Canton of Vaud. For further information, in particular regarding the special procedure to be followed to apply to exercise these entitlements, you are invited to consult the information published, in French only, on the Swiss Mission’s website: for the Canton of Genevafor the Canton of VaudThe dates of the forthcoming ballots are available on the official websites of the cantonal administrative authorities: for Geneva: referendum and forthcoming ballots ; for Vaud: forthcoming ballots In this context, please note, especially with regard to eligibility for election, that: in accordance with Articles S I 3.05 and I 3.06 of the Staff Rules "Members of the personnel wishing to take part in the public and political life of a State shall comply with the relevant legislat...

  8. The influence of proprietary disclosure costs on the decision to go public

    NARCIS (Netherlands)

    Marra, T.A.

    2001-01-01

    This thesis studies the influence of proprietary disclosure costs related to informing product market competitors on management communication with investors. In doing so it focuses on the firm's decision to go public. A firm that goes public not only experiences a change in its financial and

  9. Beyond the Business Model: Incentives for Organizations to Publish Software Source Code

    Science.gov (United States)

    Lindman, Juho; Juutilainen, Juha-Pekka; Rossi, Matti

    The software stack opened under Open Source Software (OSS) licenses is growing rapidly. Commercial actors have released considerable amounts of previously proprietary source code. These actions beg the question why companies choose a strategy based on giving away software assets? Research on outbound OSS approach has tried to answer this question with the concept of the “OSS business model”. When studying the reasons for code release, we have observed that the business model concept is too generic to capture the many incentives organizations have. Conversely, in this paper we investigate empirically what the companies’ incentives are by means of an exploratory case study of three organizations in different stages of their code release. Our results indicate that the companies aim to promote standardization, obtain development resources, gain cost savings, improve the quality of software, increase the trustworthiness of software, or steer OSS communities. We conclude that future research on outbound OSS could benefit from focusing on the heterogeneous incentives for code release rather than on revenue models.

  10. State of the Art of Proprietary Financial Reporting in the Department of the Navy

    National Research Council Canada - National Science Library

    Manning, Jeffrey

    1996-01-01

    .... To address this issue, a review of the laws, policies and agencies which affect proprietary reporting was conducted, along with a comparison between Federal government and private sector financial reporting...

  11. Academic Entitlement and Its Relationship with Perception of Cheating Ethics

    Science.gov (United States)

    Elias, Rafik Z.

    2017-01-01

    Cheating is an epidemic in higher education. The author examined the psychological variable of academic entitlement and its relationship with the ethical perception of cheating using a sample of business students. Contrary to some previous research, the author found that millennials were only slightly more academically entitled than students from…

  12. FreeContact: fast and free software for protein contact prediction from residue co-evolution.

    Science.gov (United States)

    Kaján, László; Hopf, Thomas A; Kalaš, Matúš; Marks, Debora S; Rost, Burkhard

    2014-03-26

    20 years of improved technology and growing sequences now renders residue-residue contact constraints in large protein families through correlated mutations accurate enough to drive de novo predictions of protein three-dimensional structure. The method EVfold broke new ground using mean-field Direct Coupling Analysis (EVfold-mfDCA); the method PSICOV applied a related concept by estimating a sparse inverse covariance matrix. Both methods (EVfold-mfDCA and PSICOV) are publicly available, but both require too much CPU time for interactive applications. On top, EVfold-mfDCA depends on proprietary software. Here, we present FreeContact, a fast, open source implementation of EVfold-mfDCA and PSICOV. On a test set of 140 proteins, FreeContact was almost eight times faster than PSICOV without decreasing prediction performance. The EVfold-mfDCA implementation of FreeContact was over 220 times faster than PSICOV with negligible performance decrease. EVfold-mfDCA was unavailable for testing due to its dependency on proprietary software. FreeContact is implemented as the free C++ library "libfreecontact", complete with command line tool "freecontact", as well as Perl and Python modules. All components are available as Debian packages. FreeContact supports the BioXSD format for interoperability. FreeContact provides the opportunity to compute reliable contact predictions in any environment (desktop or cloud).

  13. How Well Can Existing Software Support Processes Accomplish Sustainment of a Non-Developmental Item-Based Acquisition Strategy

    Science.gov (United States)

    2017-04-06

    guidance to the PM regarding development and sustainment of software . The need for a strong application of software engineering principles is...on the battlefield by a government- developed network manager application . The configuration of this confluence of software will be jointly managed...How Well Can Existing Software -Support Processes Accomplish Sustainment of a Non- Developmental Item-Based Acquisition Strategy? Graciano

  14. Entitlement Attitudes Predict Students' Poor Performance in Challenging Academic Conditions

    Science.gov (United States)

    Anderson, Donna; Halberstadt, Jamin; Aitken, Robert

    2013-01-01

    Excessive entitlement--an exaggerated or unrealistic belief about what one deserves--has been associated with a variety of maladaptive behaviors, including a decline in motivation and effort. In the context of tertiary education, we reasoned that if students expend less effort to obtain positive outcomes to which they feel entitled, this should…

  15. eSciMart: Web Platform for Scientific Software Marketplace

    Science.gov (United States)

    Kryukov, A. P.; Demichev, A. P.

    2016-10-01

    In this paper we suggest a design of a web marketplace where users of scientific application software and databases, presented in the form of web services, as well as their providers will have presence simultaneously. The model, which will be the basis for the web marketplace is close to the customer-to-customer (C2C) model, which has been successfully used, for example, on the auction sites such as eBay (ebay.com). Unlike the classical model of C2C the suggested marketplace focuses on application software in the form of web services, and standardization of API through which application software will be integrated into the web marketplace. A prototype of such a platform, entitled eSciMart, is currently being developed at SINP MSU.

  16. 47 CFR 64.2007 - Approval required for use of customer proprietary network information.

    Science.gov (United States)

    2010-10-01

    ... of marketing communications-related services to that customer. A telecommunications carrier may..., for the purpose of marketing communications-related services to that customer, to its agents and its... proprietary network information. 64.2007 Section 64.2007 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...

  17. 7 CFR 272.11 - Systematic Alien Verification for Entitlements (SAVE) Program.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 4 2010-01-01 2010-01-01 false Systematic Alien Verification for Entitlements (SAVE... FOR PARTICIPATING STATE AGENCIES § 272.11 Systematic Alien Verification for Entitlements (SAVE... and Naturalization Service (INS), in order to verify the validity of documents provided by aliens...

  18. Rights as entitlements and rights as claims

    Directory of Open Access Journals (Sweden)

    Azevedo, Marco Antônio Oliveira de

    2010-01-01

    Full Text Available Há pelo menos dois registros diferentes sobre o significado de “direitos”. Segundo um deles, os direitos são relações entre dois termos: uma pessoa e um bem; para o outro, os direitos são relações entre três termos: um indivíduo, uma pessoa e uma ação ou algo. Os registros são diferentes, mas não são totalmente incompatíveis. De acordo com a interpretação de direitos como entitlements, trata-se de direitos morais ou legais, ou seja, as relações de ordem moral ou jurídica das pessoas com bens (de benefícios concedidos a pessoas por uma lei humana, moral ou legal. Como uma espécie de direitos, os direitos humanos são vistos como direitos (entitlements das pessoas ou dos indivíduos a bens essenciais, dos quais podem-se inferir reivindicações (claims contra outras pessoas ou contra governos e representantes. Falamos sobre direitos humanos geralmente desta forma. Mas de acordo com o outro registro, os direitos em sentido próprio têm que ser interpretados como claims. Neste artigo, pretendo apresentar alguns argumentos em favor da vantagem de expor todos os enunciados significativos dos direitos como entitlements em termos explícitos de claims

  19. Vantagens competitivas com softwares livres: o caso de uma instituição de ensino [doi: 10.5329/RECADM.20100901001

    Directory of Open Access Journals (Sweden)

    Luciana Helena Crnkovic

    2010-05-01

    Full Text Available Normal 0 21 false false false PT-BR X-NONE X-NONE VANTAGENS COMPETITIVAS COM SOFTWARES LIVRES: o caso de uma instituição de ensino   RESUMO O objetivo deste trabalho é investigar o processo de migração de softwares proprietários para softwares livres – SLs em um sistema de informação – SI em uma pequena empresa, no caso, uma instituição de ensino médio. O SI é um recurso fundamental e independe do porte ou ramo de atividade da empresa. Seu bom gerenciamento pode ser capaz de potencializar processos, gerar conhecimento e criar vantagens competitivas importantes. Contudo, o alto custo da aquisição de softwares proprietários é um grande obstáculo para sua implantação abrindo uma boa oportunidade de mercado para o SL, opção gratuita e com bom desempenho. Para investigar o processo de migração para SLs foi conduzido estudo de caso em uma cooperativa de ensino médio na qual pode-se observar o crescimento da importância do SI em sua operação. Na empresa em questão pode-se identificar, após a implantação dos SLs, um aumento da sinergia interdepartamental, maior dinamismo nas atividades por conta da eficiente obtenção das informações, e maior confiabilidade no SI no que se refere à segurança. No que se refere aos SLs pode-se observar claramente sua competitividade frente aos softwares proprietários.   Palavras-Chave tecnologia da informação; sistema de informação; software livre.     COMPETITIVE ADVANTAGES IN FREE SOFTWARE: THE CASE OF AN EDUCATIONAL INSTITUTION   ABSTRACT The objective of this study is to investigate the migration of proprietary software to free software - FS in an small businesses information system – SI, an institution of higher education. The SI is a key resource an is independent of size or area of the company activity. Its appropriated management may be able to improve process, generate knowledge and create significant competitive advantages. However, the high cost of purchasing

  20. The Effects of Reducing the Entitlement Period to Unemployment Insurance Benefits

    NARCIS (Netherlands)

    de Groot, N.; van der Klaauw, B.

    This paper exploits a substantial reform of the Dutch UI law to study the effect of the entitlement period on job finding and subsequent labor market outcomes. Using detailed administrative data covering the full population we find that reducing the entitlement period increases the job finding rate,

  1. 12 CFR 615.5454 - Creation of participant's security entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Creation of participant's security entitlement... Procedures for Farm Credit Securities § 615.5454 Creation of participant's security entitlement; security... public money, including without limitation deposits to the Treasury tax and loan accounts, or other...

  2. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... CORPORATION BOOK-ENTRY PROCEDURE § 1511.4 Creation of Participant's Security Entitlement; security interests... to secure deposits of public money, including without limitation deposits to the Treasury tax and...

  3. Database Organisation in a Web-Enabled Free and Open-Source Software (foss) Environment for Spatio-Temporal Landslide Modelling

    Science.gov (United States)

    Das, I.; Oberai, K.; Sarathi Roy, P.

    2012-07-01

    Landslides exhibit themselves in different mass movement processes and are considered among the most complex natural hazards occurring on the earth surface. Making landslide database available online via WWW (World Wide Web) promotes the spreading and reaching out of the landslide information to all the stakeholders. The aim of this research is to present a comprehensive database for generating landslide hazard scenario with the help of available historic records of landslides and geo-environmental factors and make them available over the Web using geospatial Free & Open Source Software (FOSS). FOSS reduces the cost of the project drastically as proprietary software's are very costly. Landslide data generated for the period 1982 to 2009 were compiled along the national highway road corridor in Indian Himalayas. All the geo-environmental datasets along with the landslide susceptibility map were served through WEBGIS client interface. Open source University of Minnesota (UMN) mapserver was used as GIS server software for developing web enabled landslide geospatial database. PHP/Mapscript server-side application serve as a front-end application and PostgreSQL with PostGIS extension serve as a backend application for the web enabled landslide spatio-temporal databases. This dynamic virtual visualization process through a web platform brings an insight into the understanding of the landslides and the resulting damage closer to the affected people and user community. The landslide susceptibility dataset is also made available as an Open Geospatial Consortium (OGC) Web Feature Service (WFS) which can be accessed through any OGC compliant open source or proprietary GIS Software.

  4. 38 CFR 21.3045 - Entitlement charges.

    Science.gov (United States)

    2010-07-01

    ...) VOCATIONAL REHABILITATION AND EDUCATION Survivors' and Dependents' Educational Assistance Under 38 U.S.C...) Entitlement charges for elementary and secondary education. (1) When an eligible spouse or surviving spouse is... of the course or courses as a result of being— (A) Ordered, in connection with the Persian Gulf War...

  5. Entitlement attitude in the workplace and its relationship to job satisfaction and organizational commitment

    Directory of Open Access Journals (Sweden)

    Sonya Asenova Dragova-Koleva

    2017-05-01

    Full Text Available Background This article is focused on the entitlement attitude in an organizational context. Its purpose was to examine the relationship of entitlement and its 3 components (active, passive and revengefulness with job satisfaction and organizational commitment. Participants and procedure Two independent studies were conducted to examine the discussed relationships. In study 1 and study 2 there participated respectively 110 and 95 full-time employees from both genders working in public and private organizations. The 30-item Bulgarian version of the Entitlement Questionnaire was used. Job satisfaction measurement included employees’ affective response to their overall job and to various aspects of their job. The three aspects of organizational commitment (affective, instrumental and normative were measured. Results Active entitlement had a positive effect on satisfaction with results, satisfaction with supervisor, pay satisfaction and overall job satisfaction. It was not related to organizational commitment. Passive entitlement had a positive effect on satisfaction with tasks, but it correlated negatively with pay satisfaction. Higher level of passive entitlement predicted instrumental commitment. Revengefulness was negatively related to task satisfaction, satisfaction with supervisor and overall satisfaction, and had a negative effect on affective commitment. Conclusions Different forms of entitlement have a diverse influence on the various aspects of job satisfaction and components of organizational commitment. Active and passive types of entitlement are more adaptive, whereas revengefulness is a maladaptive and dysfunctional attitude.

  6. 34 CFR Appendix A to Subpart L of... - Ratio Methodology for Proprietary Institutions

    Science.gov (United States)

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false Ratio Methodology for Proprietary Institutions A Appendix A to Subpart L of Part 668 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF POSTSECONDARY EDUCATION, DEPARTMENT OF EDUCATION STUDENT ASSISTANCE GENERAL PROVISIONS...

  7. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Creation of Participant's Security... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's... Entitlement of a Participant in favor of the United States to secure deposits of public money, including...

  8. Permissive parenting and mental health in college students: Mediating effects of academic entitlement.

    Science.gov (United States)

    Barton, Alison L; Hirsch, Jameson K

    2016-01-01

    Student mental health may suffer due to unreasonable expectations associated with academic entitlement; permissive parenting may be one source of these expectations. The authors examined the role of academic entitlement as a mediator of the relationship between permissive parenting and psychological functioning. Participants were 524 undergraduate students at a single institution (52% female; age range = 18-22). Data collection was completed in May 2011. Cross-sectional design. Participants completed online self-report measures of parenting styles, academic entitlement, stress, depressive symptoms, and well-being. Permissive parenting was associated with greater academic entitlement and, in turn, to more perceived stress and poorer mental health. Mother/father differences were found in some cases. Academic entitlement may partially explain why permissive parenting is detrimentally related to mental health for college students. Implications for academic affairs and counseling include helping students develop an appreciation of the role of self-regulation in college success.

  9. 18 CFR 1314.5 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Creation of Participant... FEDERAL RESERVE BANKS § 1314.5 Creation of Participant's Security Entitlement; security interests. (a) A... Security Entitlement of a Participant in favor of the United States to secure deposits of public money...

  10. 76 FR 28819 - NUREG/CR-XXXX, Development of Quantitative Software Reliability Models for Digital Protection...

    Science.gov (United States)

    2011-05-18

    ... NUCLEAR REGULATORY COMMISSION [NRC-2011-0109] NUREG/CR-XXXX, Development of Quantitative Software...: The Nuclear Regulatory Commission has issued for public comment a document entitled: NUREG/CR-XXXX...-XXXX is available electronically under ADAMS Accession Number ML111020087. Federal Rulemaking Web Site...

  11. CrossTalk, The Journal of Defense Software Engineering. Volume 27, Number 4. July/August 2014

    Science.gov (United States)

    2014-07-01

    his writing. His works include “The Psychology of Computer Program- ming, An Introduction to General Systems Thinking, Becoming a Technical Leader ...en.wikipedia.org/wiki/Six_phases_of_a_big_ project). I am certainly not the originator. In 1997, Robert Glass published a book entitledSoftware Runaways ...failures. In fact, to quote from the Amazon.com “blurb” on the book, Runaways brings a software engineer’s perspective to projects like: American

  12. Software for dosimetry hypothyroid patients treated with I131 pick up and using probe gamma camera; Software para la dosimetria de pacientes hipertiroideos tratados con 131I utilizando sonda de captacion y gammacamara

    Energy Technology Data Exchange (ETDEWEB)

    Jimenez Felstrom, D.; Luis simon, J.; Reyes Garcia, R.; Derecho Torres, P.; Herrador Cordoba, M.

    2015-07-01

    In this communication the process recently implemented in our hospital for pre and post treatment of patients treated with I-131 in benign diseases of the thyroid gland internal dosimetry is described. We have developed a proprietary software that facilitates the process of dosimetry. Through scans Planar or pictures Spect be determines the mass of the gland thyroid. In function of the mass, is calculated by Monte Carlo the media power absorbed by disintegration of the I-131 in said gland endocrine. (Author)

  13. Development of an open source software of quantitative analysis for radionuclide determination by gamma-ray spectrometry using semiconductor detectors

    International Nuclear Information System (INIS)

    Maduar, Marcelo Francis

    2010-01-01

    Radioactivity quantification of gamma-ray emitter radionuclides in samples measured by HPGe gamma-ray spectrometry relies on the analysis of the photopeaks present in the spectra, especially on the accurate determination of their net areas. Such a task is usually performed with the aid of proprietary software tools. This work presents a methodology, algorithm descriptions and an open source application, called OpenGamma, for the peak search and analysis in order to obtain the relevant peaks parameters and radionuclides activities. The computational implementation is released entirely in open-source license for the main code and with the use of open software packages for interface design and mathematical libraries. The procedure for the peak search is performed on a three step approach. Firstly a preliminary search is done by using the second-difference method, consisting in the generation of a derived spectrum in order to find candidate peaks. In the second step, the experimental peaks widths are assessed and well formed and isolated ones are chosen to obtain a FWHM vs. channel relationship, by application of the Levenberg-Marquardt minimization method for non-linear fitting. Lastly, regions of the spectrum with grouped peaks are marked and a non-linear fit is again applied to each region to obtain baseline and photopeaks terms; from these terms, peaks net areas are then assessed. (author)

  14. Internet-based hardware/software co-design framework for embedded 3D graphics applications

    Directory of Open Access Journals (Sweden)

    Wong Weng-Fai

    2011-01-01

    Full Text Available Abstract Advances in technology are making it possible to run three-dimensional (3D graphics applications on embedded and handheld devices. In this article, we propose a hardware/software co-design environment for 3D graphics application development that includes the 3D graphics software, OpenGL ES application programming interface (API, device driver, and 3D graphics hardware simulators. We developed a 3D graphics system-on-a-chip (SoC accelerator using transaction-level modeling (TLM. This gives software designers early access to the hardware even before it is ready. On the other hand, hardware designers also stand to gain from the more complex test benches made available in the software for verification. A unique aspect of our framework is that it allows hardware and software designers from geographically dispersed areas to cooperate and work on the same framework. Designs can be entered and executed from anywhere in the world without full access to the entire framework, which may include proprietary components. This results in controlled and secure transparency and reproducibility, granting leveled access to users of various roles.

  15. Identifying Two Groups of Entitled Individuals: Cluster Analysis Reveals Emotional Stability and Self-Esteem Distinction.

    Science.gov (United States)

    Crowe, Michael L; LoPilato, Alexander C; Campbell, W Keith; Miller, Joshua D

    2016-12-01

    The present study hypothesized that there exist two distinct groups of entitled individuals: grandiose-entitled, and vulnerable-entitled. Self-report scores of entitlement were collected for 916 individuals using an online platform. Model-based cluster analyses were conducted on the individuals with scores one standard deviation above mean (n = 159) using the five-factor model dimensions as clustering variables. The results support the existence of two groups of entitled individuals categorized as emotionally stable and emotionally vulnerable. The emotionally stable cluster reported emotional stability, high self-esteem, more positive affect, and antisocial behavior. The emotionally vulnerable cluster reported low self-esteem and high levels of neuroticism, disinhibition, conventionality, psychopathy, negative affect, childhood abuse, intrusive parenting, and attachment difficulties. Compared to the control group, both clusters reported being more antagonistic, extraverted, Machiavellian, and narcissistic. These results suggest important differences are missed when simply examining the linear relationships between entitlement and various aspects of its nomological network.

  16. Leadership Style, Employee Satisfaction, and Productivity in the Enrollment Department of a Proprietary University

    Science.gov (United States)

    Chitwood, James

    2010-01-01

    The success of an enrollment department is critical to the success of an educational institution. The quantitative research study used a correlational design to measure the relationship between perceived leadership style, employee satisfaction, and departmental productivity. A sample of 41 admissions personnel from a Midwest proprietary university…

  17. PRISM, Processing and Review Interface for Strong Motion Data Software

    Science.gov (United States)

    Kalkan, E.; Jones, J. M.; Stephens, C. D.; Ng, P.

    2016-12-01

    A continually increasing number of high-quality digital strong-motion records from stations of the National Strong Motion Project (NSMP) of the U.S. Geological Survey (USGS), as well as data from regional seismic networks within the U.S., calls for automated processing of strong-motion records with human review limited to selected significant or flagged records. The NSMP has developed the Processing and Review Interface for Strong Motion data (PRISM) software to meet this need. PRISM automates the processing of strong-motion records by providing batch-processing capabilities. The PRISM software is platform-independent (coded in Java), open-source, and does not depend on any closed-source or proprietary software. The software consists of two major components: a record processing engine composed of modules for each processing step, and a graphical user interface (GUI) for manual review and processing. To facilitate the use by non-NSMP earthquake engineers and scientists, PRISM (both its processing engine and GUI components) is easy to install and run as a stand-alone system on common operating systems such as Linux, OS X and Windows. PRISM was designed to be flexible and extensible in order to accommodate implementation of new processing techniques. Input to PRISM currently is limited to data files in the Consortium of Organizations for Strong-Motion Observation Systems (COSMOS) V0 format, so that all retrieved acceleration time series need to be converted to this format. Output products include COSMOS V1, V2 and V3 files as: (i) raw acceleration time series in physical units with mean removed (V1), (ii) baseline-corrected and filtered acceleration, velocity, and displacement time series (V2), and (iii) response spectra, Fourier amplitude spectra and common earthquake-engineering intensity measures (V3). A thorough description of the record processing features supported by PRISM is presented with examples and validation results. All computing features have been

  18. Restricted health care entitlements for child migrants in Europe and Australia

    DEFF Research Database (Denmark)

    Østergaard, Liv Stubbe; Norredam, Marie; Mock-Munoz de Luna, Claire

    2017-01-01

    Background: More than 300 000 asylum seeking children were registered in Europe alone during 2015. In this study, we examined entitlements for health care for these and other migrant children in Europe and Australia in a framework based on United Nations Convention of the Rights of the Child (UNCRC......). Methods: Survey to child health professionals, NGO's and European Ombudspersons for Children in 30 EU/EEA countries and Australia, supplemented by desktop research of official documents. Migrant children were categorised as asylum seekers and irregular/undocumented migrants. Results: Five countries....... Twelve European countries have limited entitlements to health care for asylum seeking children, including Germany that stands out as the country with the most restrictive health care policy for migrant children. In Australia entitlements for health care are restricted for asylum seeking children...

  19. 78 FR 46418 - Proposed Information Collection (Obligation To Report Factors Affecting Entitlement) Activity...

    Science.gov (United States)

    2013-07-31

    ... (Obligation To Report Factors Affecting Entitlement) Activity; Comment Request AGENCY: Veterans Benefits... use of other forms of information technology. Title: Obligation to Report Factors Affecting... entitlement factors. Individual factors such as income, marital status, and the beneficiary's number of...

  20. The role of open-source software in innovation and standardization in radiology.

    Science.gov (United States)

    Erickson, Bradley J; Langer, Steve; Nagy, Paul

    2005-11-01

    The use of open-source software (OSS), in which developers release the source code to applications they have developed, is popular in the software industry. This is done to allow others to modify and improve software (which may or may not be shared back to the community) and to allow others to learn from the software. Radiology was an early participant in this model, supporting OSS that implemented the ACR-National Electrical Manufacturers Association (now Digital Imaging and Communications in Medicine) standard for medical image communications. In radiology and in other fields, OSS has promoted innovation and the adoption of standards. Popular OSS is of high quality because access to source code allows many people to identify and resolve errors. Open-source software is analogous to the peer-review scientific process: one must be able to see and reproduce results to understand and promote what is shared. The authors emphasize that support for OSS need not threaten vendors; most vendors embrace and benefit from standards. Open-source development does not replace vendors but more clearly defines their roles, typically focusing on areas in which proprietary differentiators benefit customers and on professional services such as implementation planning and service. Continued support for OSS is essential for the success of our field.

  1. Between availability and entitlement: The Constitution, Grootboom ...

    African Journals Online (AJOL)

    Between availability and entitlement: The Constitution, Grootboom and the right to food. Danie Brand. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians ...

  2. Tax treaty entitlement issues concerning dual residents

    NARCIS (Netherlands)

    Sanghavi, D.

    2014-01-01

    The question whether a dual resident taxpayer is entitled to tax treaties concluded by each residence state with a third state has been controversial. Since 2008, the Organisation for Economic Co-operation and Development (OECD) Commentary on Article 4(1) of the OECD Model states that such a

  3. A Software Reuse Approach and Its Effect On Software Quality, An Empirical Study for The Software Industry

    OpenAIRE

    Mateen, Ahmed; Kausar, Samina; Sattar, Ahsan Raza

    2017-01-01

    Software reusability has become much interesting because of increased quality and reduce cost. A good process of software reuse leads to enhance the reliability, productivity, quality and the reduction of time and cost. Current reuse techniques focuses on the reuse of software artifact which grounded on anticipated functionality whereas, the non-functional (quality) aspect are also important. So, Software reusability used here to expand quality and productivity of software. It improves overal...

  4. Software for dosimetry hypothyroid patients treated with I131 pick up and using probe gamma camera

    International Nuclear Information System (INIS)

    Jimenez Felstrom, D.; Luis simon, J.; Reyes Garcia, R.; Derecho Torres, P.; Herrador Cordoba, M.

    2015-01-01

    In this communication the process recently implemented in our hospital for pre and post treatment of patients treated with I-131 in benign diseases of the thyroid gland internal dosimetry is described. We have developed a proprietary software that facilitates the process of dosimetry. Through scans Planar or pictures Spect be determines the mass of the gland thyroid. In function of the mass, is calculated by Monte Carlo the media power absorbed by disintegration of the I-131 in said gland endocrine. (Author)

  5. Permissive Parenting and Mental Health in College Students: Mediating Effects of Academic Entitlement

    Science.gov (United States)

    Barton, Alison L.; Hirsch, Jameson K.

    2016-01-01

    Objective: Student mental health may suffer due to unreasonable expectations associated with academic entitlement; permissive parenting may be one source of these expectations. The authors examined the role of academic entitlement as a mediator of the relationship between permissive parenting and psychological functioning. Participants:…

  6. 20 CFR 725.228 - Effect of conviction of felonious and intentional homicide on entitlement to benefits.

    Science.gov (United States)

    2010-04-01

    ... intentional homicide on entitlement to benefits. 725.228 Section 725.228 Employees' Benefits EMPLOYMENT... intentional homicide on entitlement to benefits. An individual who has been convicted of the felonious and intentional homicide of a miner or other beneficiary shall not be entitled to receive any benefits payable...

  7. Proceedings of the Twenty-Fourth Annual Software Engineering Workshop

    Science.gov (United States)

    2000-01-01

    On December 1 and 2, the Software Engineering Laboratory (SEL), a consortium composed of NASA/Goddard, the University of Maryland, and CSC, held the 24th Software Engineering Workshop (SEW), the last of the millennium. Approximately 240 people attended the 2-day workshop. Day 1 was composed of four sessions: International Influence of the Software Engineering Laboratory; Object Oriented Testing and Reading; Software Process Improvement; and Space Software. For the first session, three internationally known software process experts discussed the influence of the SEL with respect to software engineering research. In the Space Software session, prominent representatives from three different NASA sites- GSFC's Marti Szczur, the Jet Propulsion Laboratory's Rick Doyle, and the Ames Research Center IV&V Facility's Lou Blazy- discussed the future of space software in their respective centers. At the end of the first day, the SEW sponsored a reception at the GSFC Visitors' Center. Day 2 also provided four sessions: Using the Experience Factory; A panel discussion entitled "Software Past, Present, and Future: Views from Government, Industry, and Academia"; Inspections; and COTS. The day started with an excellent talk by CSC's Frank McGarry on "Attaining Level 5 in CMM Process Maturity." Session 2, the panel discussion on software, featured NASA Chief Information Officer Lee Holcomb (Government), our own Jerry Page (Industry), and Mike Evangelist of the National Science Foundation (Academia). Each presented his perspective on the most important developments in software in the past 10 years, in the present, and in the future.

  8. Astronomy Student Activities Using Stellarium Software

    Science.gov (United States)

    Benge, Raymond D.; Tuttle, S. R.

    2012-01-01

    Planetarium programs can be used to provide a valuable learning experience for introductory astronomy students. Educational activities can be designed to utilize the capabilities of the software to display the sky, coordinates, motions in the sky, etc., in order to learn basic astronomical concepts. Most of the major textbook publishers have an option of bundling planetarium software and even laboratory activities using such software with textbooks. However, commercial planetarium software often is updated on a different schedule from the textbook revision and new edition schedule. The software updates also sometimes occur out of sync with college textbook adoption deadlines. Changes in software and activity curriculum often translate into increases costs for students and the college. To provide stability to the process, faculty at Tarrant County College have developed a set of laboratory exercises, entitled Distant Nature, using free open source Stellarium software. Stellarium is a simple, yet powerful, program that is available in formats that run on a variety of operating systems (Windows, Apple, linux). A web site was developed for the Distant Nature activities having a set version of Stellarium that students can download and install on their own computers. Also on the web site, students can access the instructions and worksheets associated with the various Stellarium based activities. A variety of activities are available to support two semesters of introductory astronomy. The Distant Nature web site has been used for one year with Tarrant County College astronomy students and is now available for use by other institutions. The Distant Nature web site is http://www.stuttle1.com/DN_Astro/index.html .

  9. Reforming Equalization: Balancing Efficiency, Entitlement and Ownership

    Directory of Open Access Journals (Sweden)

    Bev Dahlby

    2014-08-01

    Full Text Available In this paper, we provide an overview of the equalization grant system in Canada and the issues that have been raised concerning the reform of the fiscal transfer system. Any reforms to the equalization grant system have to balance three concerns — “efficiency” effects that arise through federal financing of transfers, and the incentive effects on provincial fiscal policies, “entitlement” to reasonably comparable public services at reasonably comparable levels of taxation, and “ownership” of resources and independence of fiscal policies by provincial governments. Five proposals for reform of the equalization system are discussed. With regard to the inclusion rate for resource revenues in equalization formula, we argue that the rate should be reduced from 50 per cent to 25 per cent and that ceiling on total equalization payments should be eliminated. We argue against the proposal to exempt from the calculation of equalization entitlements that are deposited in provincial sovereign wealth funds because this would not reduce total equalization entitlements in present value terms, it would be complex to implement if it extended to all forms of savings by provinces (such as debt reduction, and it would not alter the resource rich provinces’ incentives to save more of their resource revenues. We argue against a proposal to reduce CHT and CST to provinces with above average fiscal capacities because this would reduce their incentive to develop and tax their resources, and it would be counter to the purpose of these block grants, which is to reduce the vertical fiscal imbalance between the federal and the provincial governments. We review the Gusen (2012a proto-type model for incorporating variations in costs and needs in the computation of the equalization entitlements and argue that this procedure seems feasible and merits further analysis.

  10. 20 CFR 404.337 - When does my entitlement to widow's and widower's benefits start and end?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When does my entitlement to widow's and widower's benefits start and end? 404.337 Section 404.337 Employees' Benefits SOCIAL SECURITY... does my entitlement to widow's and widower's benefits start and end? (a) We will find you entitled to...

  11. Transfer of single farm payment entitlements to farm successors: impact on structural change and rental prices in Switzerland

    Directory of Open Access Journals (Sweden)

    Gabriele Mack

    2013-09-01

    Full Text Available This paper analyses the impact of tradable and non-tradable single farm payment (SFP entitlements for farm successors on structural change and the lease market. Using the example of Swiss agriculture, the effects on rental-price trends and farm-exit rates are investigated. An ex-ante normative impact analysis is performed with the agent-based agricultural-sector model SWISSland, which simulates structural change processes and income trends in Swiss agriculture over a period of up to 15 years. A land market implemented at municipality level simulates the plot-by-plot leasing of land to surrounding neighbouring agents that is common in Switzerland. Allocation of plots to tenants as well as lease pricing is modelled taking into account the farm-specific land rents. The results show that personalised SFP entitlements which could not be transferred to a farm successor not only cause an intensification of structural change, but would also thus lead to a substantial reduction in rental prices. SFP entitlements which were successfully transferred to farm successors have only a slight impact on structural change and the rental prices of arable land. Only for grassland in the mountain region does a stronger shift result in a significant reduction in rental prices.

  12. Development of a Method for Quantifying the Reliability of Nuclear Safety-Related Software

    Energy Technology Data Exchange (ETDEWEB)

    Yi Zhang; Michael W. Golay

    2003-10-01

    The work of our project is intended to help introducing digital technologies into nuclear power into nuclear power plant safety related software applications. In our project we utilize a combination of modern software engineering methods: design process discipline and feedback, formal methods, automated computer aided software engineering tools, automatic code generation, and extensive feasible structure flow path testing to improve software quality. The tactics include ensuring that the software structure is kept simple, permitting routine testing during design development, permitting extensive finished product testing in the input data space of most likely service and using test-based Bayesian updating to estimate the probability that a random software input will encounter an error upon execution. From the results obtained the software reliability can be both improved and its value estimated. Hopefully our success in the project's work can aid the transition of the nuclear enterprise into the modern information world. In our work, we have been using the proprietary sample software, the digital Signal Validation Algorithm (SVA), provided by Westinghouse. Also our work is being done with their collaboration. The SVA software is used for selecting the plant instrumentation signal set which is to be used as the input the digital Plant Protection System (PPS). This is the system that automatically decides whether to trip the reactor. In our work, we are using -001 computer assisted software engineering (CASE) tool of Hamilton Technologies Inc. This tool is capable of stating the syntactic structure of a program reflecting its state requirements, logical functions and data structure.

  13. Development of a Method for Quantifying the Reliability of Nuclear Safety-Related Software

    International Nuclear Information System (INIS)

    Yi Zhang; Golay, Michael W.

    2003-01-01

    The work of our project is intended to help introducing digital technologies into nuclear power into nuclear power plant safety related software applications. In our project we utilize a combination of modern software engineering methods: design process discipline and feedback, formal methods, automated computer aided software engineering tools, automatic code generation, and extensive feasible structure flow path testing to improve software quality. The tactics include ensuring that the software structure is kept simple, permitting routine testing during design development, permitting extensive finished product testing in the input data space of most likely service and using test-based Bayesian updating to estimate the probability that a random software input will encounter an error upon execution. From the results obtained the software reliability can be both improved and its value estimated. Hopefully our success in the project's work can aid the transition of the nuclear enterprise into the modern information world. In our work, we have been using the proprietary sample software, the digital Signal Validation Algorithm (SVA), provided by Westinghouse. Also our work is being done with their collaboration. The SVA software is used for selecting the plant instrumentation signal set which is to be used as the input the digital Plant Protection System (PPS). This is the system that automatically decides whether to trip the reactor. In our work, we are using -001 computer assisted software engineering (CASE) tool of Hamilton Technologies Inc. This tool is capable of stating the syntactic structure of a program reflecting its state requirements, logical functions and data structure

  14. Enhancing requirements engineering for patient registry software systems with evidence-based components.

    Science.gov (United States)

    Lindoerfer, Doris; Mansmann, Ulrich

    2017-07-01

    Patient registries are instrumental for medical research. Often their structures are complex and their implementations use composite software systems to meet the wide spectrum of challenges. Commercial and open-source systems are available for registry implementation, but many research groups develop their own systems. Methodological approaches in the selection of software as well as the construction of proprietary systems are needed. We propose an evidence-based checklist, summarizing essential items for patient registry software systems (CIPROS), to accelerate the requirements engineering process. Requirements engineering activities for software systems follow traditional software requirements elicitation methods, general software requirements specification (SRS) templates, and standards. We performed a multistep procedure to develop a specific evidence-based CIPROS checklist: (1) A systematic literature review to build a comprehensive collection of technical concepts, (2) a qualitative content analysis to define a catalogue of relevant criteria, and (3) a checklist to construct a minimal appraisal standard. CIPROS is based on 64 publications and covers twelve sections with a total of 72 items. CIPROS also defines software requirements. Comparing CIPROS with traditional software requirements elicitation methods, SRS templates and standards show a broad consensus but differences in issues regarding registry-specific aspects. Using an evidence-based approach to requirements engineering for registry software adds aspects to the traditional methods and accelerates the software engineering process for registry software. The method we used to construct CIPROS serves as a potential template for creating evidence-based checklists in other fields. The CIPROS list supports developers in assessing requirements for existing systems and formulating requirements for their own systems, while strengthening the reporting of patient registry software system descriptions. It may be

  15. Gender Differences in Pay Histories and Views on Pay Entitlement among University Students.

    Science.gov (United States)

    Desmarais, Serge; Curtis, James

    1997-01-01

    Examines whether gender differences in recent pay experience influence entitlement views by providing different standards for female and male students' judgments of their entitlements. Responses from 309 undergraduate students reveal that income gaps in the full-time working world extended to their own recent work experiences and that these past…

  16. Wealth and the inflated self: class, entitlement, and narcissism.

    Science.gov (United States)

    Piff, Paul K

    2014-01-01

    Americans may be more narcissistic now than ever, but narcissism is not evenly distributed across social strata. Five studies demonstrated that higher social class is associated with increased entitlement and narcissism. Upper-class individuals reported greater psychological entitlement (Studies 1a, 1b, and 2) and narcissistic personality tendencies (Study 2), and they were more likely to behave in a narcissistic fashion by opting to look at themselves in a mirror (Study 3). Finally, inducing egalitarian values in upper-class participants decreased their narcissism to a level on par with their lower-class peers (Study 4). These findings offer novel evidence regarding the influence of social class on the self and highlight the importance of social stratification to understanding basic psychological processes.

  17. 75 FR 68035 - Proposed Information Collection (Evidence for Transfer of Entitlement of Education Benefits...

    Science.gov (United States)

    2010-11-04

    ... (Evidence for Transfer of Entitlement of Education Benefits) Activity: Comment Request AGENCY: Veterans Benefits Administration, Department of Veterans Affairs. ACTION: Notice. SUMMARY: The Veterans Benefits... receive education benefits under the transfer of entitlement provision of law. Affected Public...

  18. 78 FR 59772 - Proposed Information Collection (Evidence for Transfer of Entitlement of Education Benefits...

    Science.gov (United States)

    2013-09-27

    ... (Evidence for Transfer of Entitlement of Education Benefits) Activity: Comment Request AGENCY: Veterans Benefits Administration, Department of Veterans Affairs. ACTION: Notice. SUMMARY: The Veterans Benefits... receive education benefits under the transfer of entitlement provision of law. Affected Public...

  19. Electronic Health Record for Intensive Care based on Usual Windows Based Software.

    Science.gov (United States)

    Reper, Arnaud; Reper, Pascal

    2015-08-01

    In Intensive Care Units, the amount of data to be processed for patients care, the turn over of the patients, the necessity for reliability and for review processes indicate the use of Patient Data Management Systems (PDMS) and electronic health records (EHR). To respond to the needs of an Intensive Care Unit and not to be locked with proprietary software, we developed an EHR based on usual software and components. The software was designed as a client-server architecture running on the Windows operating system and powered by the access data base system. The client software was developed using Visual Basic interface library. The application offers to the users the following functions: medical notes captures, observations and treatments, nursing charts with administration of medications, scoring systems for classification, and possibilities to encode medical activities for billing processes. Since his deployment in September 2004, the EHR was used to care more than five thousands patients with the expected software reliability and facilitated data management and review processes. Communications with other medical software were not developed from the start, and are realized by the use of basic functionalities communication engine. Further upgrade of the system will include multi-platform support, use of typed language with static analysis, and configurable interface. The developed system based on usual software components was able to respond to the medical needs of the local ICU environment. The use of Windows for development allowed us to customize the software to the preexisting organization and contributed to the acceptability of the whole system.

  20. PRISM Software: Processing and Review Interface for Strong‐Motion Data

    Science.gov (United States)

    Jones, Jeanne M.; Kalkan, Erol; Stephens, Christopher D.; Ng, Peter

    2017-01-01

    A continually increasing number of high‐quality digital strong‐motion records from stations of the National Strong Motion Project (NSMP) of the U.S. Geological Survey, as well as data from regional seismic networks within the United States, calls for automated processing of strong‐motion records with human review limited to selected significant or flagged records. The NSMP has developed the Processing and Review Interface for Strong Motion data (PRISM) software to meet this need. In combination with the Advanced National Seismic System Quake Monitoring System (AQMS), PRISM automates the processing of strong‐motion records. When used without AQMS, PRISM provides batch‐processing capabilities. The PRISM software is platform independent (coded in Java), open source, and does not depend on any closed‐source or proprietary software. The software consists of two major components: a record processing engine composed of modules for each processing step, and a review tool, which is a graphical user interface for manual review, edit, and processing. To facilitate use by non‐NSMP earthquake engineers and scientists, PRISM (both its processing engine and review tool) is easy to install and run as a stand‐alone system on common operating systems such as Linux, OS X, and Windows. PRISM was designed to be flexible and extensible to accommodate implementation of new processing techniques. All the computing features have been thoroughly tested.

  1. A SOFTWARE RELIABILITY ESTIMATION METHOD TO NUCLEAR SAFETY SOFTWARE

    Directory of Open Access Journals (Sweden)

    GEE-YONG PARK

    2014-02-01

    Full Text Available A method for estimating software reliability for nuclear safety software is proposed in this paper. This method is based on the software reliability growth model (SRGM, where the behavior of software failure is assumed to follow a non-homogeneous Poisson process. Two types of modeling schemes based on a particular underlying method are proposed in order to more precisely estimate and predict the number of software defects based on very rare software failure data. The Bayesian statistical inference is employed to estimate the model parameters by incorporating software test cases as a covariate into the model. It was identified that these models are capable of reasonably estimating the remaining number of software defects which directly affects the reactor trip functions. The software reliability might be estimated from these modeling equations, and one approach of obtaining software reliability value is proposed in this paper.

  2. 77 FR 23 - Prohibitions and Restrictions on Proprietary Trading and Certain Interests in, and Relationships...

    Science.gov (United States)

    2012-01-03

    ... Relationships With, Hedge Funds and Private Equity Funds AGENCIES: Office of the Comptroller of the Currency... relationships with, a hedge fund or private equity fund (``proposed rule''). Due to the complexity of the issues... in proprietary trading and have certain interests in, or relationships with, a hedge fund or private...

  3. The Drug Discovery and Development Industry in India-Two Decades of Proprietary Small-Molecule R&D.

    Science.gov (United States)

    Differding, Edmond

    2017-06-07

    This review provides a comprehensive survey of proprietary drug discovery and development efforts performed by Indian companies between 1994 and mid-2016. It is based on the identification and detailed analysis of pharmaceutical, biotechnology, and contract research companies active in proprietary new chemical entity (NCE) research and development (R&D) in India. Information on preclinical and clinical development compounds was collected by company, therapeutic indication, mode of action, target class, and development status. The analysis focuses on the overall pipeline and its evolution over two decades, contributions by type of company, therapeutic focus, attrition rates, and contribution to Western pharmaceutical pipelines through licensing agreements. This comprehensive analysis is the first of its kind, and, in our view, represents a significant contribution to the understanding of the current state of the drug discovery and development industry in India. © 2017 The Author. Published by Wiley-VCH Verlag GmbH & Co. KGaA.

  4. PROPOSTA DE INVESTIGAÇÃO SOBRE O USO DE SOFTWARE NO SUPORTE À INOVAÇÃO EM SERVIÇOS

    Directory of Open Access Journals (Sweden)

    Alessandro de Orlando Maia Pinheiro

    2015-08-01

    Full Text Available This article examines the goals, instruments and characteristics of Information and Communication Technolgy (ICT enabled innovations in the Brazilian software industry emphasizing technologies, transmitting channels, learning processes, and organizational changes required by advanced digital tools. The methodology steams from the adaptation of an existing taxonomy for our specific purposes and the development of a field research in Brazil, with the help of the software Atlas.ti. We found that ICT enabled innovations are not isolated events, since they affect existing processes, the relationship with clients and suppliers, and require greater integration of organizational functions. Important differences were observed due to the firms’ size, internationalization level, technical capabilities and access to proprietary technology.

  5. Social policy and entitlements : a proposal for reform

    NARCIS (Netherlands)

    Nentjes, Andries; Meijer, G; Heijman, WJM; VanOphem, JAC; Verstegen, BHJ

    2006-01-01

    Welfare states citizens have entitlements to a variety of social services provided for free or a price far below cost, such as education, health care, social security and housing. Every citizen benefits, but in their present organisation the social services also have major deficiencies: lack of

  6. Isolation and identification of phytoestrogens and flavonoids in an Ayurvedic proprietary medicine using chromatographic and Mass Spectroscopic analysis

    Institute of Scientific and Technical Information of China (English)

    Sulaiman CT; Arun A; Anandan EM; Sandhya CR; Indira Balachandran

    2015-01-01

    Objective: To develop analytical methods for the isolation and structural identification of poly phenols including phytoestrogens in Mensokot tablet, a herbal proprietary medicine. Methods:Isolation consisted of an ultrasound-assisted extraction, followed by acid hydrolysis and a final liquid-liquid extraction step in diethyl ether. Identification and structural characterisation was done by liquid chromatography coupled with Q-TOF-ESI-MS/MS analysis. Results:Phytoestrogens such as Coumestrol, Genistein and Glycitein have been identified in Mensokot tablet along with several other flavonoids. Conclusion: In the present research, a rapid HPLC-MS/MS method has been developed for the identification of phytoestrogens and other flavonoids from an Ayurvedic proprietary medicine. Phytoestrogens are considered to play an important role in the prevention of cancers, heart disease, menopausal symptoms and osteoporosis.

  7. Processing and review interface for strong motion data (PRISM) software, version 1.0.0—Methodology and automated processing

    Science.gov (United States)

    Jones, Jeanne; Kalkan, Erol; Stephens, Christopher

    2017-02-23

    A continually increasing number of high-quality digital strong-motion records from stations of the National Strong-Motion Project (NSMP) of the U.S. Geological Survey (USGS), as well as data from regional seismic networks within the United States, call for automated processing of strong-motion records with human review limited to selected significant or flagged records. The NSMP has developed the Processing and Review Interface for Strong Motion data (PRISM) software to meet this need. In combination with the Advanced National Seismic System Quake Monitoring System (AQMS), PRISM automates the processing of strong-motion records. When used without AQMS, PRISM provides batch-processing capabilities. The PRISM version 1.0.0 is platform independent (coded in Java), open source, and does not depend on any closed-source or proprietary software. The software consists of two major components: a record processing engine and a review tool that has a graphical user interface (GUI) to manually review, edit, and process records. To facilitate use by non-NSMP earthquake engineers and scientists, PRISM (both its processing engine and review tool) is easy to install and run as a stand-alone system on common operating systems such as Linux, OS X, and Windows. PRISM was designed to be flexible and extensible in order to accommodate new processing techniques. This report provides a thorough description and examples of the record processing features supported by PRISM. All the computing features of PRISM have been thoroughly tested.

  8. Clinical evaluation of reducing acquisition time on single-photon emission computed tomography image quality using proprietary resolution recovery software.

    Science.gov (United States)

    Aldridge, Matthew D; Waddington, Wendy W; Dickson, John C; Prakash, Vineet; Ell, Peter J; Bomanji, Jamshed B

    2013-11-01

    A three-dimensional model-based resolution recovery (RR) reconstruction algorithm that compensates for collimator-detector response, resulting in an improvement in reconstructed spatial resolution and signal-to-noise ratio of single-photon emission computed tomography (SPECT) images, was tested. The software is said to retain image quality even with reduced acquisition time. Clinically, any improvement in patient throughput without loss of quality is to be welcomed. Furthermore, future restrictions in radiotracer supplies may add value to this type of data analysis. The aims of this study were to assess improvement in image quality using the software and to evaluate the potential of performing reduced time acquisitions for bone and parathyroid SPECT applications. Data acquisition was performed using the local standard SPECT/CT protocols for 99mTc-hydroxymethylene diphosphonate bone and 99mTc-methoxyisobutylisonitrile parathyroid SPECT imaging. The principal modification applied was the acquisition of an eight-frame gated data set acquired using an ECG simulator with a fixed signal as the trigger. This had the effect of partitioning the data such that the effect of reduced time acquisitions could be assessed without conferring additional scanning time on the patient. The set of summed data sets was then independently reconstructed using the RR software to permit a blinded assessment of the effect of acquired counts upon reconstructed image quality as adjudged by three experienced observers. Data sets reconstructed with the RR software were compared with the local standard processing protocols; filtered back-projection and ordered-subset expectation-maximization. Thirty SPECT studies were assessed (20 bone and 10 parathyroid). The images reconstructed with the RR algorithm showed improved image quality for both full-time and half-time acquisitions over local current processing protocols (Pimproved image quality compared with local processing protocols and has been

  9. OpenChrom: a cross-platform open source software for the mass spectrometric analysis of chromatographic data.

    Science.gov (United States)

    Wenig, Philip; Odermatt, Juergen

    2010-07-30

    Today, data evaluation has become a bottleneck in chromatographic science. Analytical instruments equipped with automated samplers yield large amounts of measurement data, which needs to be verified and analyzed. Since nearly every GC/MS instrument vendor offers its own data format and software tools, the consequences are problems with data exchange and a lack of comparability between the analytical results. To challenge this situation a number of either commercial or non-profit software applications have been developed. These applications provide functionalities to import and analyze several data formats but have shortcomings in terms of the transparency of the implemented analytical algorithms and/or are restricted to a specific computer platform. This work describes a native approach to handle chromatographic data files. The approach can be extended in its functionality such as facilities to detect baselines, to detect, integrate and identify peaks and to compare mass spectra, as well as the ability to internationalize the application. Additionally, filters can be applied on the chromatographic data to enhance its quality, for example to remove background and noise. Extended operations like do, undo and redo are supported. OpenChrom is a software application to edit and analyze mass spectrometric chromatographic data. It is extensible in many different ways, depending on the demands of the users or the analytical procedures and algorithms. It offers a customizable graphical user interface. The software is independent of the operating system, due to the fact that the Rich Client Platform is written in Java. OpenChrom is released under the Eclipse Public License 1.0 (EPL). There are no license constraints regarding extensions. They can be published using open source as well as proprietary licenses. OpenChrom is available free of charge at http://www.openchrom.net.

  10. Embracing Open Software Development in Solar Physics

    Science.gov (United States)

    Hughitt, V. K.; Ireland, J.; Christe, S.; Mueller, D.

    2012-12-01

    We discuss two ongoing software projects in solar physics that have adopted best practices of the open source software community. The first, the Helioviewer Project, is a powerful data visualization tool which includes online and Java interfaces inspired by Google Maps (tm). This effort allows users to find solar features and events of interest, and download the corresponding data. Having found data of interest, the user now has to analyze it. The dominant solar data analysis platform is an open-source library called SolarSoft (SSW). Although SSW itself is open-source, the programming language used is IDL, a proprietary language with licensing costs that are prohibative for many institutions and individuals. SSW is composed of a collection of related scripts written by missions and individuals for solar data processing and analysis, without any consistent data structures or common interfaces. Further, at the time when SSW was initially developed, many of the best software development processes of today (mirrored and distributed version control, unit testing, continuous integration, etc.) were not standard, and have not since been adopted. The challenges inherent in developing SolarSoft led to a second software project known as SunPy. SunPy is an open-source Python-based library which seeks to create a unified solar data analysis environment including a number of core datatypes such as Maps, Lightcurves, and Spectra which have consistent interfaces and behaviors. By taking advantage of the large and sophisticated body of scientific software already available in Python (e.g. SciPy, NumPy, Matplotlib), and by adopting many of the best practices refined in open-source software development, SunPy has been able to develop at a very rapid pace while still ensuring a high level of reliability. The Helioviewer Project and SunPy represent two pioneering technologies in solar physics - simple yet flexible data visualization and a powerful, new data analysis environment. We

  11. Effects of customer entitlement on service workers' physical and psychological well-being: a study of waitstaff employees.

    Science.gov (United States)

    Fisk, Glenda M; Neville, Lukas B

    2011-10-01

    This exploratory study examines the nature of customer entitlement and its impact on front-line service employees. In an open-ended qualitative inquiry, 56 individuals with waitstaff experience described the types of behaviors entitled customers engage in and the kinds of service-related "perks" these individuals feel deserving of. Participants explained how they responded to entitled customers, how and when managers became involved, and how their dealings with these patrons influenced their subjective physical and psychological well-being. We found that the behaviors of entitled customers negatively impacted waitstaff employees. Participants reported physiological arousal, negative affect, burnout, and feelings of dehumanization as a result of dealing with these patrons. While respondents drew on a variety of strategies to manage their encounters with entitled customers, they indicated workplace support was often informal and described feeling abandoned by management in dealing with this workplace stressor. Approaching customer entitlement as a form of microaggression, we offer recommendations for practice and suggest new directions for future research. . (PsycINFO Database Record (c) 2011 APA, all rights reserved).

  12. 75 FR 52619 - Entitlement and Termination Requirements for Stepchildren

    Science.gov (United States)

    2010-08-27

    ... site, Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: Electronic... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 404 [Docket No. SSA-2006-0154] RIN 0960-AF78 Entitlement and Termination Requirements for Stepchildren AGENCY: Social Security Administration. ACTION...

  13. Intellectual Freedom and Economic Sufficiency as Educational Entitlements.

    Science.gov (United States)

    Morse, Jane Fowler

    2001-01-01

    Using the theories of John Stuart Mill and Karl Marx, this article supports the educational entitlements of intellectual freedom and economic sufficiency. Explores these issues in reference to their implications for teaching, the teaching profession and its training. Concludes that ideas cannot be controlled by the interests of the dominant class.…

  14. 14 CFR 11.35 - Does FAA include sensitive security information and proprietary information in the Federal Docket...

    Science.gov (United States)

    2010-01-01

    ... RULEMAKING PROCEDURES Rulemaking Procedures General § 11.35 Does FAA include sensitive security information and proprietary information in the Federal Docket Management System (FDMS)? (a) Sensitive security information. You should not submit sensitive security information to the rulemaking docket, unless you are...

  15. Consistent Evolution of Software Artifacts and Non-Functional Models

    Science.gov (United States)

    2014-11-14

    induce bad software performance)? 15. SUBJECT TERMS EOARD, Nano particles, Photo-Acoustic Sensors, Model-Driven Engineering ( MDE ), Software Performance...Università degli Studi dell’Aquila, Via Vetoio, 67100 L’Aquila, Italy Email: vittorio.cortellessa@univaq.it Web : http: // www. di. univaq. it/ cortelle/ Phone...Model-Driven Engineering ( MDE ), Software Performance Engineering (SPE), Change Propagation, Performance Antipatterns. For sake of readability of the

  16. Entitlement to concessionary public transport and wellbeing: a qualitative study of young people and older citizens in London, UK.

    Science.gov (United States)

    Jones, Alasdair; Goodman, Anna; Roberts, Helen; Steinbach, Rebecca; Green, Judith

    2013-08-01

    Access to transport is an important determinant of health, and concessionary fares for public transport are one way to reduce the 'transport exclusion' that can limit access. This paper draws on qualitative data from two groups typically at risk of transport exclusion: young people (12-18 years of age, n = 118) and older citizens (60+ years of age, n = 46). The data were collected in London, UK, where young people and older citizens are currently entitled to concessionary bus travel. We focus on how this entitlement is understood and enacted, and how different sources of entitlement mediate the relationship between transport and wellbeing. Both groups felt that their formal entitlement to travel for free reflected their social worth and was, particularly for older citizens, relatively unproblematic. The provision of a concessionary transport entitlement also helped to combat feelings of social exclusion by enhancing recipients' sense of belonging to the city and to a 'community'. However, informal entitlements to particular spaces on the bus reflected less valued social attributes such as need or frailty. Thus in the course of travelling by bus the enactment of entitlements to space and seats entailed the negotiation of social differences and personal vulnerabilities, and this carried with it potential threats to wellbeing. We conclude that the process, as well as the substance, of entitlement can mediate wellbeing; and that where the basis for providing a given entitlement is widely understood and accepted, the risks to wellbeing associated with enacting that entitlement will be reduced. Copyright © 2012 Elsevier Ltd. All rights reserved.

  17. Selection and integration of a network of parallel processors in the real time acquisition system of the 4π DIAMANT multidetector: modeling, realization and evaluation of the software installed on this network

    International Nuclear Information System (INIS)

    Guirande, F.

    1997-01-01

    The increase in sensitivity of 4π arrays such as EUROBALL or DIAMANT has led to an increase in the data flow rate into the data acquisition system. If at the electronic level, the data flow has been distributed onto several data acquisition buses, it is necessary in the data processing system to increase the processing power. This work regards the modelling and implementation of the software allocated onto an architecture of parallel processors. Object analysis and formal methods were used, benchmark and evolution in the future of this architecture are presented. The thesis consists of two parts. Part A, devoted to 'Nuclear Spectroscopy with 4 π multidetectors', contains a first chapter entitled 'The Physics of 4π multidetectors' and a second chapter entitled 'Integral architecture of 4π multidetectors'. Part B, devoted to 'Parallel acquisition system of DIAMANT' contains three chapters entitled 'Material architecture', 'Software architecture' and 'Validation and Performances'. Four appendices and a term glossary close this work. (author)

  18. 76 FR 28789 - Draft Alert Entitled “Preventing Occupational Respiratory Disease From Dampness in Office...

    Science.gov (United States)

    2011-05-18

    ... NIOSH-238] Draft Alert Entitled ``Preventing Occupational Respiratory Disease From Dampness in Office... Institute for Occupational Safety and Health (NIOSH) of the Centers for Disease Control and Prevention (CDC), announces the availability of a draft Alert entitled ``Preventing Occupational Respiratory Disease from...

  19. Review Article: Revisiting the Entitlement Approach to Famine ...

    African Journals Online (AJOL)

    Sen's (1981b) entitlement approach conceptualises famine as the characteristics of some people not having enough food to eat but not of there being not enough food to eat. Famine from this perspective is one that occurs without a decline in the macro level supply of food and, hence, it is all about demand failure/shift in the ...

  20. Possibilities and limitations of applying software reliability growth models to safety-critical software

    International Nuclear Information System (INIS)

    Kim, Man Cheol; Jang, Seung Cheol; Ha, Jae Joo

    2007-01-01

    It is generally known that software reliability growth models such as the Jelinski-Moranda model and the Goel-Okumoto's Non-Homogeneous Poisson Process (NHPP) model cannot be applied to safety-critical software due to a lack of software failure data. In this paper, by applying two of the most widely known software reliability growth models to sample software failure data, we demonstrate the possibility of using the software reliability growth models to prove the high reliability of safety-critical software. The high sensitivity of a piece of software's reliability to software failure data, as well as a lack of sufficient software failure data, is also identified as a possible limitation when applying the software reliability growth models to safety-critical software

  1. Upgrades to the Probabilistic NAS Platform Air Traffic Simulation Software

    Science.gov (United States)

    Hunter, George; Boisvert, Benjamin

    2013-01-01

    This document is the final report for the project entitled "Upgrades to the Probabilistic NAS Platform Air Traffic Simulation Software." This report consists of 17 sections which document the results of the several subtasks of this effort. The Probabilistic NAS Platform (PNP) is an air operations simulation platform developed and maintained by the Saab Sensis Corporation. The improvements made to the PNP simulation include the following: an airborne distributed separation assurance capability, a required time of arrival assignment and conformance capability, and a tactical and strategic weather avoidance capability.

  2. Approaching Corporate Social Responsibility through Kenneth Burke's Notions of Terministic Screens and Entitlement

    DEFF Research Database (Denmark)

    Kampf, Constance

    summarizes Burke's essay, "Antinomies of Definition," from a Grammar of Motives as demonstrating that 'the intrinsic and the extrinsic can change places' "such that to define is always to contextualize and to uncover the absence of a solid ground for a claim to knowledge."2   So if the intrinsic...... allow for user agency, whereas entitlement appears to be focused more at the cultural level, with the agency shared by the 'tribe,' the language itself, and the context of situation.1 In other words, "terministic screens" appear to be extrinsic, while "entitlement" appears to be intrinsic.  Carmichael...... and extrinsic can change places, the interpretive process of "terministic screens" and the constitutive process of "entitlement" may well be reciprocal.  The implications of this reciprocity can be used as a basis for understanding the linguistic and cultural components of Corporate Social Responsibility...

  3. A Reading Preference and Risk Taxonomy for Printed Proprietary Information Compromise in the Aerospace and Defense Industry

    Science.gov (United States)

    Stalker, Joshua Dylan

    2012-01-01

    The protection of proprietary information that users print from their information systems is a significant and relevant concern in the field of information security to both researchers and practitioners. Information security researchers have repeatedly indicated that human behaviors and perception are important factors influencing the information…

  4. FluxPyt: a Python-based free and open-source software for 13C-metabolic flux analyses.

    Science.gov (United States)

    Desai, Trunil S; Srivastava, Shireesh

    2018-01-01

    13 C-Metabolic flux analysis (MFA) is a powerful approach to estimate intracellular reaction rates which could be used in strain analysis and design. Processing and analysis of labeling data for calculation of fluxes and associated statistics is an essential part of MFA. However, various software currently available for data analysis employ proprietary platforms and thus limit accessibility. We developed FluxPyt, a Python-based truly open-source software package for conducting stationary 13 C-MFA data analysis. The software is based on the efficient elementary metabolite unit framework. The standard deviations in the calculated fluxes are estimated using the Monte-Carlo analysis. FluxPyt also automatically creates flux maps based on a template for visualization of the MFA results. The flux distributions calculated by FluxPyt for two separate models: a small tricarboxylic acid cycle model and a larger Corynebacterium glutamicum model, were found to be in good agreement with those calculated by a previously published software. FluxPyt was tested in Microsoft™ Windows 7 and 10, as well as in Linux Mint 18.2. The availability of a free and open 13 C-MFA software that works in various operating systems will enable more researchers to perform 13 C-MFA and to further modify and develop the package.

  5. Software for Distributed Computation on Medical Databases: A Demonstration Project

    Directory of Open Access Journals (Sweden)

    Balasubramanian Narasimhan

    2017-05-01

    Full Text Available Bringing together the information latent in distributed medical databases promises to personalize medical care by enabling reliable, stable modeling of outcomes with rich feature sets (including patient characteristics and treatments received. However, there are barriers to aggregation of medical data, due to lack of standardization of ontologies, privacy concerns, proprietary attitudes toward data, and a reluctance to give up control over end use. Aggregation of data is not always necessary for model fitting. In models based on maximizing a likelihood, the computations can be distributed, with aggregation limited to the intermediate results of calculations on local data, rather than raw data. Distributed fitting is also possible for singular value decomposition. There has been work on the technical aspects of shared computation for particular applications, but little has been published on the software needed to support the "social networking" aspect of shared computing, to reduce the barriers to collaboration. We describe a set of software tools that allow the rapid assembly of a collaborative computational project, based on the flexible and extensible R statistical software and other open source packages, that can work across a heterogeneous collection of database environments, with full transparency to allow local officials concerned with privacy protections to validate the safety of the method. We describe the principles, architecture, and successful test results for the site-stratified Cox model and rank-k singular value decomposition.

  6. Open high-level data formats and software for gamma-ray astronomy

    Science.gov (United States)

    Deil, Christoph; Boisson, Catherine; Kosack, Karl; Perkins, Jeremy; King, Johannes; Eger, Peter; Mayer, Michael; Wood, Matthew; Zabalza, Victor; Knödlseder, Jürgen; Hassan, Tarek; Mohrmann, Lars; Ziegler, Alexander; Khelifi, Bruno; Dorner, Daniela; Maier, Gernot; Pedaletti, Giovanna; Rosado, Jaime; Contreras, José Luis; Lefaucheur, Julien; Brügge, Kai; Servillat, Mathieu; Terrier, Régis; Walter, Roland; Lombardi, Saverio

    2017-01-01

    In gamma-ray astronomy, a variety of data formats and proprietary software have been traditionally used, often developed for one specific mission or experiment. Especially for ground-based imaging atmospheric Cherenkov telescopes (IACTs), data and software are mostly private to the collaborations operating the telescopes. However, there is a general movement in science towards the use of open data and software. In addition, the next-generation IACT instrument, the Cherenkov Telescope Array (CTA), will be operated as an open observatory. We have created a Github organisation at https://github.com/open-gamma-ray-astro where we are developing high-level data format specifications. A public mailing list was set up at https://lists.nasa.gov/mailman/listinfo/open-gamma-ray-astro and a first face-to-face meeting on the IACT high-level data model and formats took place in April 2016 in Meudon (France). This open multi-mission effort will help to accelerate the development of open data formats and open-source software for gamma-ray astronomy, leading to synergies in the development of analysis codes and eventually better scientific results (reproducible, multi-mission). This write-up presents this effort for the first time, explaining the motivation and context, the available resources and process we use, as well as the status and planned next steps for the data format specifications. We hope that it will stimulate feedback and future contributions from the gamma-ray astronomy community.

  7. Computer games and software engineering

    CERN Document Server

    Cooper, Kendra M L

    2015-01-01

    Computer games represent a significant software application domain for innovative research in software engineering techniques and technologies. Game developers, whether focusing on entertainment-market opportunities or game-based applications in non-entertainment domains, thus share a common interest with software engineers and developers on how to best engineer game software.Featuring contributions from leading experts in software engineering, the book provides a comprehensive introduction to computer game software development that includes its history as well as emerging research on the inte

  8. Open-Source web-based geographical information system for health exposure assessment

    Directory of Open Access Journals (Sweden)

    Evans Barry

    2012-01-01

    Full Text Available Abstract This paper presents the design and development of an open source web-based Geographical Information System allowing users to visualise, customise and interact with spatial data within their web browser. The developed application shows that by using solely Open Source software it was possible to develop a customisable web based GIS application that provides functions necessary to convey health and environmental data to experts and non-experts alike without the requirement of proprietary software.

  9. Open-Source web-based geographical information system for health exposure assessment

    DEFF Research Database (Denmark)

    Evans, Barry; Sabel, Clive E

    2012-01-01

    This paper presents the design and development of an open source web-based Geographical Information System allowing users to visualise, customise and interact with spatial data within their web browser. The developed application shows that by using solely Open Source software it was possible to d...... to develop a customisable web based GIS application that provides functions necessary to convey health and environmental data to experts and non-experts alike without the requirement of proprietary software....

  10. 21 CFR 1.401 - Who is entitled to appeal?

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Who is entitled to appeal? 1.401 Section 1.401 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL GENERAL ENFORCEMENT REGULATIONS Administrative Detention of Food for Human or Animal Consumption What Is the Appeal...

  11. 76 FR 2758 - Agency Information Collection (Evidence for Transfer of Entitlement of Education Benefits (CFR 21...

    Science.gov (United States)

    2011-01-14

    ... for Transfer of Entitlement of Education Benefits (CFR 21.7080)) Activity Under OMB Review AGENCY... INFORMATION: Title: Evidence for Transfer of Entitlement of Education Benefits (CFR 21.7080). OMB Control... DOD Form 2366-1 to determine whether the dependent qualifies to receive education benefits under the...

  12. 20 CFR 410.250 - Effect of conviction of felonious and intentional homicide on entitlement to benefits.

    Science.gov (United States)

    2010-04-01

    ... intentional homicide on entitlement to benefits. 410.250 Section 410.250 Employees' Benefits SOCIAL SECURITY... conviction of felonious and intentional homicide on entitlement to benefits. An individual who has been finally convicted by a court of competent jurisdiction of the felonious and intentional homicide of a...

  13. International conference entitled Zdeněk Kopal’s Binary Star Legacy

    CERN Document Server

    Drechsel, Horst; ZDENEK KOPAL’S BINARY STAR LEGACY

    2005-01-01

    An international conference entitled "Zdenek Kopal's Binary Star Legacy" was held on the occasion of the late Professor Kopal's 90th birthday in his home town of Litomyšl/Czech Republic and dedicated to the memory of one of the leading astronomers of the 20th century. Professor Kopal, who devoted 60 years of his scientific life to the exploration of close binary systems, initiated a breakthrough in this field with his description of binary components as non-spherical stars deformed by gravity, with surfaces following Roche equipotentials. Such knowledge triggered the development of new branches of astrophysics dealing with the structure and evolution of close binaries and the interaction effects displayed by exciting objects such as cataclysmic variables, symbiotic stars or X-ray binaries. Contributions to this conference included praise of the achievements of a great astronomer and personal reminiscences brought forward by Kopal's former students and colleagues, and reflected the state of the art of the dyn...

  14. Robert Nozick's entitlement theory of justice: a critique | Nnajiofor ...

    African Journals Online (AJOL)

    The burden of this paper is to critique Robert Nozick's entitlement theory of justice which was drafted as an argument against traditional distribution theories. Nozick's theory of justice claims that whether a distribution is just or not depend entirely on how it came about. By contrast, justice according to equality, need, desert or ...

  15. A Systematic Approach for Evaluating BPM Systems: Case Studies on Open Source and Proprietary Tools

    OpenAIRE

    Delgado , Andrea; Calegari , Daniel; Milanese , Pablo; Falcon , Renatta; García , Esteban

    2015-01-01

    Part 3: Examples and Case Studies; International audience; Business Process Management Systems (BPMS) provide support for modeling, developing, deploying, executing and evaluating business processes in an organization. Selecting a BPMS is not a trivial task, not only due to the many existing alternatives, both in the open source and proprietary realms, but also because it requires a thorough evaluation of its capabilities, contextualizing them in the organizational environment in which they w...

  16. A generic open-source software framework supporting scenario simulations in bioterrorist crises.

    Science.gov (United States)

    Falenski, Alexander; Filter, Matthias; Thöns, Christian; Weiser, Armin A; Wigger, Jan-Frederik; Davis, Matthew; Douglas, Judith V; Edlund, Stefan; Hu, Kun; Kaufman, James H; Appel, Bernd; Käsbohrer, Annemarie

    2013-09-01

    Since the 2001 anthrax attack in the United States, awareness of threats originating from bioterrorism has grown. This led internationally to increased research efforts to improve knowledge of and approaches to protecting human and animal populations against the threat from such attacks. A collaborative effort in this context is the extension of the open-source Spatiotemporal Epidemiological Modeler (STEM) simulation and modeling software for agro- or bioterrorist crisis scenarios. STEM, originally designed to enable community-driven public health disease models and simulations, was extended with new features that enable integration of proprietary data as well as visualization of agent spread along supply and production chains. STEM now provides a fully developed open-source software infrastructure supporting critical modeling tasks such as ad hoc model generation, parameter estimation, simulation of scenario evolution, estimation of effects of mitigation or management measures, and documentation. This open-source software resource can be used free of charge. Additionally, STEM provides critical features like built-in worldwide data on administrative boundaries, transportation networks, or environmental conditions (eg, rainfall, temperature, elevation, vegetation). Users can easily combine their own confidential data with built-in public data to create customized models of desired resolution. STEM also supports collaborative and joint efforts in crisis situations by extended import and export functionalities. In this article we demonstrate specifically those new software features implemented to accomplish STEM application in agro- or bioterrorist crisis scenarios.

  17. A View on a Successful International Educational Project in Software Engineering

    Directory of Open Access Journals (Sweden)

    Zoran Budimac

    2012-01-01

    Full Text Available In this paper, a successful and fruitful joint project will be presented. The project joins participants from 9 countries and from 15 universities. Since it started in 2001, this project entitledSoftware Engineering: Computer Science Education and Research Cooperation” helped participants to gain excellent, up to date educational material, apply modern teaching methods, exchange experiences with other participants, and work jointly on the further development of lectures, case-studies, assignments, examination questions, and other necessary elements of a course. Project works under auspices of Stability Pact of South-Eastern Europe, and is supported by DAAD. The project started with the creation of a common beginning course in “Software Engineering”, but over time it grew and the number of other courses was developed. Finished almost completely are the courses in “Object-oriented programming”, “Software Project Management”, “Advanced Compiler Construction”, and “Data Structures and Algorithms”, and some other courses are under development. Aside from the educational collaboration, project members also developed good scientific cooperation, and published several research papers.

  18. FORUM: Instructional Communication and Millennial Students: Millennial Students in the College Classroom: Adjusting to Academic Entitlement

    Science.gov (United States)

    Goldman, Zachary W.; Martin, Matthew M.

    2016-01-01

    Academic entitlement (AE) refers to the expectation of educational success despite the input of personal effort needed to earn it (Boswell, 2012). Entitled students feel that learning should require minimal work and that difficulties encountered during the learning process should be attributed to instructors, rather than themselves. AE has become…

  19. Penggunaan Metode Estimasi Use Case Points (UCP Dalam Proyek Software Domain Bisnis

    Directory of Open Access Journals (Sweden)

    Edhi Prayitno

    2017-09-01

    Abstract Software plays an important role in a business to accelerate and manage business processes better. Software development projects as well as projects generally require the right estimates to work well and smoothly. Use case points method is used to estimate object-based software with good accuracy. The value of the Effort Rate (ER used in the UCP estimation method has values range from 4 to 35 man-hours, so it will make it difficult for novice developers to determine the exact ER value. Thomas Tan in his dissertation entitled 'Domain-Based Effort Distribution Model For Software Cost Estimation' shows that each application has a different distribution effort according to its 21 domain characteristics. From the results of research conducted on the project sales system goods, obtained the actual value of effort and cost close to the estimated value made. The estimated value of effort is 381.3 hours and 407.5 hours actual effort, while the estimated cost is IDR 39,804,236 and the actual cost is IDR 47,675,417 to get the value of deviation effort 6,4% and deviation cost 16,5%.   Keywords: Estimate effort and cost software, use case points (UCP, application domain.

  20. National Health Service Principles as Experienced by Vulnerable London Migrants in "Austerity Britain": A Qualitative Study of Rights, Entitlements, and Civil-Society Advocacy.

    Science.gov (United States)

    Rafighi, Elham; Poduval, Shoba; Legido-Quigley, Helena; Howard, Natasha

    2016-05-08

    Recent British National Health Service (NHS) reforms, in response to austerity and alleged 'health tourism,' could impose additional barriers to healthcare access for non-European Economic Area (EEA) migrants. This study explores policy reform challenges and implications, using excerpts from the perspectives of non-EEA migrants and health advocates in London. A qualitative study design was selected. Data were collected through document review and 22 in-depth interviews with non-EEA migrants and civil-society organisation representatives. Data were analysed thematically using the NHS principles. The experiences of those 'vulnerable migrants' (ie, defined as adult non-EEA asylum-seekers, refugees, undocumented, low-skilled, and trafficked migrants susceptible to marginalised healthcare access) able to access health services were positive, with healthcare professionals generally demonstrating caring attitudes. However, general confusion existed about entitlements due to recent NHS changes, controversy over 'health tourism,' and challenges registering for health services or accessing secondary facilities. Factors requiring greater clarity or improvement included accessibility, communication, and clarity on general practitioner (GP) responsibilities and migrant entitlements. Legislation to restrict access to healthcare based on immigration status could further compromise the health of vulnerable individuals in Britain. This study highlights current challenges in health services policy and practice and the role of non-governmental organizations (NGOs) in healthcare advocacy (eg, helping the voices of the most vulnerable reach policy-makers). Thus, it contributes to broadening national discussions and enabling more nuanced interpretation of ongoing global debates on immigration and health. © 2016 by Kerman University of Medical Sciences

  1. Safe water: an enquiry into water entitlements and human rights

    NARCIS (Netherlands)

    Gaay Fortman, B. de

    2006-01-01

    Privatisation of water delivery is a human rights issue in two distinct ways. Firstly, it implies an institutional change that will tend to impinge on existing access to water. While basic water entitlements are supposed to be protected by human rights law, this is likely to influence

  2. Numerical Analyses of Subsoil-structure Interaction in Original Non-commercial Software based on FEM

    Science.gov (United States)

    Cajka, R.; Vaskova, J.; Vasek, J.

    2018-04-01

    For decades attention has been paid to interaction of foundation structures and subsoil and development of interaction models. Given that analytical solutions of subsoil-structure interaction could be deduced only for some simple shapes of load, analytical solutions are increasingly being replaced by numerical solutions (eg. FEM – Finite element method). Numerical analyses provides greater possibilities for taking into account the real factors involved in the subsoil-structure interaction and was also used in this article. This makes it possible to design the foundation structures more efficiently and still reliably and securely. Currently there are several software that, can deal with the interaction of foundations and subsoil. It has been demonstrated that non-commercial software called MKPINTER (created by Cajka) provides appropriately results close to actual measured values. In MKPINTER software stress-strain analysis of elastic half-space by means of Gauss numerical integration and Jacobean of transformation is done. Input data for numerical analysis were observed by experimental loading test of concrete slab. The loading was performed using unique experimental equipment which was constructed in the area Faculty of Civil Engineering, VŠB-TU Ostrava. The purpose of this paper is to compare resulting deformation of the slab with values observed during experimental loading test.

  3. Entitled vengeance: A meta-analysis relating narcissism to provoked aggression.

    Science.gov (United States)

    Rasmussen, Kyler

    2016-07-01

    Narcissism has long been used to predict aggressive or vengeful responses to provocations from others. The strength of this relation can, however, vary widely from study to study. Narcissism and revenge were examined in 84 independent samples (N = 11297), along with the moderating role of sample type (i.e., child/adolescent, prisoner, undergraduate, or general samples), type of narcissism measure used (i.e., Narcissistic Personality Inventory, Psychological Entitlement Scale, Short D3, etc.), the nature of the provocation, and the type of provoked aggression examined. Narcissism was positively related to provoked aggression across studies (ρ = .25), but that relation was stronger in child/adolescent samples (ρ = .36) and when measures of entitlement or vulnerable narcissism were employed (ρ = .29). Implications for practical research, as well as neglected areas of research on narcissism and provoked aggression are discussed. Aggr. Behav. 42:362-379, 2016. © 2015 Wiley Periodicals, Inc. © 2015 Wiley Periodicals, Inc.

  4. Use of voice recognition software in an outpatient pediatric specialty practice.

    Science.gov (United States)

    Issenman, Robert M; Jaffer, Iqbal H

    2004-09-01

    Voice recognition software (VRS), with specialized medical vocabulary, is being promoted to enhance physician efficiency, decrease costs, and improve patient safety. This study reports the experience of a pediatric subspecialist (pediatric gastroenterology) physician with the use of Dragon Naturally Speaking (version 6; ScanSoft Inc, Peabody, MA), incorporated for use with a proprietary electronic medical record, in a large university medical center ambulatory care service. After 2 hours of group orientation and 2 hours of individual VRS instruction, the physician trained the software for 1 month (30 letters) during a hospital slowdown. Set-up, dictation, and correction times for the physician and medical transcriptionist were recorded for these training sessions, as well as for 42 subsequently dictated letters. Figures were extrapolated to the yearly clinic volume for the physician, to estimate costs (physician: 110 dollars per hour; transcriptionist: 11 dollars per hour, US dollars). The use of VRS required an additional 200% of physician dictation and correction time (9 minutes vs 3 minutes), compared with the use of electronic signatures for letters typed by an experienced transcriptionist and imported into the electronic medical record. When the cost of the license agreement and the costs of physician and transcriptionist time were included, the use of the software cost 100% more, for the amount of dictation performed annually by the physician. VRS is an intriguing technology. It holds the possibility of streamlining medical practice. However, the learning curve and accuracy of the tested version of the software limit broad physician acceptance at this time.

  5. Agentic and communal narcissism and satisfaction with life: The mediating role of psychological entitlement and self-esteem.

    Science.gov (United States)

    Żemojtel-Piotrowska, Magdalena A; Piotrowski, Jarosław P; Maltby, John

    2017-10-01

    This study examined the mediational role of self-esteem (as an enhancement) and psychological entitlement (as a cost) in the relationship between an agentic-communal model of grandiose narcissism and satisfaction with life. Two hundred and forty-eight university undergraduate students completed measures of agentic and communal narcissism, self-esteem, psychological entitlement and satisfaction with life. The findings suggest that there is support for the usefulness of the agentic-communal model of narcissism, and, consistent with predictions in the wider literature, self-esteem and psychological entitlement mediated the relationship between agentic-communal narcissism and life satisfaction. © 2015 International Union of Psychological Science.

  6. SAGES: a suite of freely-available software tools for electronic disease surveillance in resource-limited settings.

    Directory of Open Access Journals (Sweden)

    Sheri L Lewis

    Full Text Available Public health surveillance is undergoing a revolution driven by advances in the field of information technology. Many countries have experienced vast improvements in the collection, ingestion, analysis, visualization, and dissemination of public health data. Resource-limited countries have lagged behind due to challenges in information technology infrastructure, public health resources, and the costs of proprietary software. The Suite for Automated Global Electronic bioSurveillance (SAGES is a collection of modular, flexible, freely-available software tools for electronic disease surveillance in resource-limited settings. One or more SAGES tools may be used in concert with existing surveillance applications or the SAGES tools may be used en masse for an end-to-end biosurveillance capability. This flexibility allows for the development of an inexpensive, customized, and sustainable disease surveillance system. The ability to rapidly assess anomalous disease activity may lead to more efficient use of limited resources and better compliance with World Health Organization International Health Regulations.

  7. Non-Coop Station History Forms Digest

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Single 71-page document entitled 'Station history non-COOP Keying Rules & Forms Digest,' dated December 12, 2003. Contractors with NCDC Climate Database...

  8. 48 CFR 212.212 - Computer software.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Computer software. 212.212... Acquisition of Commercial Items 212.212 Computer software. (1) Departments and agencies shall identify and... technology development), opportunities for the use of commercial computer software and other non...

  9. Effects of a proprietary Bacillus coagulans preparation on symptoms of diarrhea-predominant irritable bowel syndrome.

    Science.gov (United States)

    Dolin, B J

    2009-12-01

    Symptoms of irritable bowel syndrome (IBS) have a profound impact on quality of life for many patients and current treatments are sometimes unsatisfactory. This controlled pilot study was conducted to evaluate effects of the proprietary GanedenBC(30) (Bacillus coagulans GBI-30, 6086) probiotic on IBS symptoms, in a randomized, double-blind, placebo-controlled clinical trial including patients with diarrhea-predominant IBS (IBS-D). Patients were randomized to receive either B. coagulans GBI-30, 6086 or placebo once a day for 8 weeks. Patients filled out a quality-of-life questionnaire, and self-assessment diaries were provided to record stool count and consistency, symptom severity, and medication consumption. Of the 61 patients enrolled, six did not meet the inclusion criteria and three were lost to follow-up. Of the remaining 52 patients with IBS-D, the average number of bowel movements per day was significantly reduced for patients treated with B. coagulans GBI-30, 6086 when compared to placebo (P = 0.042). Large variability in baseline scores prevented the assessment of severity scores and quality of life. This small pilot study provides evidence that the proprietary B. coagulans GBI-30, 6086 probiotic is safe and effective for reducing daily bowel movements in patients with IBS-D. Copyright 2009 Prous Science, S.A.U. or its licensors. All rights reserved.

  10. GMFilter and SXTestPlate: software tools for improving the SNPlex™ genotyping system

    Directory of Open Access Journals (Sweden)

    Schreiber Stefan

    2009-03-01

    Full Text Available Abstract Background Genotyping of single-nucleotide polymorphisms (SNPs is a fundamental technology in modern genetics. The SNPlex™ mid-throughput genotyping system (Applied Biosystems, Foster City, CA, USA enables the multiplexed genotyping of up to 48 SNPs simultaneously in a single DNA sample. The high level of automation and the large amount of data produced in a high-throughput laboratory require advanced software tools for quality control and workflow management. Results We have developed two programs, which address two main aspects of quality control in a SNPlex™ genotyping environment: GMFilter improves the analysis of SNPlex™ plates by removing wells with a low overall signal intensity. It enables scientists to automatically process the raw data in a standardized way before analyzing a plate with the proprietary GeneMapper software from Applied Biosystems. SXTestPlate examines the genotype concordance of a SNPlex™ test plate, which was typed with a control SNP set. This program allows for regular quality control checks of a SNPlex™ genotyping platform. It is compatible to other genotyping methods as well. Conclusion GMFilter and SXTestPlate provide a valuable tool set for laboratories engaged in genotyping based on the SNPlex™ system. The programs enhance the analysis of SNPlex™ plates with the GeneMapper software and enable scientists to evaluate the performance of their genotyping platform.

  11. National Health Service Principles as Experienced by Vulnerable London Migrants in “Austerity Britain”: A Qualitative Study of Rights, Entitlements, and Civil-Society Advocacy

    Directory of Open Access Journals (Sweden)

    Elham Rafighi

    2016-10-01

    Full Text Available Background: Recent British National Health Service (NHS reforms, in response to austerity and alleged ‘health tourism,’ could impose additional barriers to healthcare access for non-European Economic Area (EEA migrants. This study explores policy reform challenges and implications, using excerpts from the perspectives of non-EEA migrants and health advocates in London. Methods: A qualitative study design was selected. Data were collected through document review and 22 indepth interviews with non-EEA migrants and civil-society organisation representatives. Data were analysed thematically using the NHS principles. Results: The experiences of those ‘vulnerable migrants’ (ie, defined as adult non-EEA asylum-seekers, refugees, undocumented, low-skilled, and trafficked migrants susceptible to marginalised healthcare access able to access health services were positive, with healthcare professionals generally demonstrating caring attitudes. However, general confusion existed about entitlements due to recent NHS changes, controversy over ‘health tourism,’ and challenges registering for health services or accessing secondary facilities. Factors requiring greater clarity or improvement included accessibility, communication, and clarity on general practitioner (GP responsibilities and migrant entitlements. Conclusion: Legislation to restrict access to healthcare based on immigration status could further compromise the health of vulnerable individuals in Britain. This study highlights current challenges in health services policy and practice and the role of non-governmental organizations (NGOs in healthcare advocacy (eg, helping the voices of the most vulnerable reach policy-makers. Thus, it contributes to broadening national discussions and enabling more nuanced interpretation of ongoing global debates on immigration and health.

  12. 17 CFR 240.3a44-1 - Proprietary government securities transactions incidental to the futures-related business of a...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Proprietary government securities transactions incidental to the futures-related business of a CFTC-regulated person. 240.3a44-1 Section 240.3a44-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED...

  13. Terminological recommendations for software localization

    Directory of Open Access Journals (Sweden)

    Klaus-Dirk Schmitz

    2012-08-01

    Full Text Available After an explosive growth of data processing and software starting at the beginning of the 1980s, the software industry shifted toward a strong orientation in non-US markets at the beginning of the 1990s. Today we see the global marketing of software in almost all regions of the world. Since software is no longer used by IT experts only, and since European and national regulations require user interfaces, manuals and documentation to be provided in the language of the customer, the market for software translation, i.e. for software localization, is the fastest growing market in the translation business.

  14. Terminological recommendations for software localization

    Directory of Open Access Journals (Sweden)

    Klaus-Dirk Schmitz

    2009-03-01

    Full Text Available After an explosive growth of data processing and software starting at the beginning of the 1980s, the software industry shifted toward a strong orientation in non-US markets at the beginning of the 1990s. Today we see the global marketing of software in almost all regions of the world. Since software is no longer used by IT experts only, and since European and national regulations require user interfaces, manuals and documentation to be provided in the language of the customer, the market for software translation, i.e. for software localization, is the fastest growing market in the translation business.

  15. Toward Baseline Software Anomalies in NASA Missions

    Science.gov (United States)

    Layman, Lucas; Zelkowitz, Marvin; Basili, Victor; Nikora, Allen P.

    2012-01-01

    In this fast abstract, we provide preliminary findings an analysis of 14,500 spacecraft anomalies from unmanned NASA missions. We provide some baselines for the distributions of software vs. non-software anomalies in spaceflight systems, the risk ratings of software anomalies, and the corrective actions associated with software anomalies.

  16. Cover Letter Dear Editor, Please find enclosed a paper entitled ...

    African Journals Online (AJOL)

    Ajamein

    Dear Editor,. Please find enclosed a paper entitled ' Intrinsic Kinetics of Fischer- Tropsch Synthesis Over a. Promoted Iron Catalyst '. I am submitting to your journal to be considered for publication as a research paper in Bulletin of the Chemical Society of Ethiopia. The manuscript has not been previously published, is not ...

  17. RIS modality interfaces. From proprietary solutions to DICOM worklist management

    International Nuclear Information System (INIS)

    Jaeger, D.; Kotter, E.; Langer, M.

    1999-01-01

    Radiologic information systems (RIS) and picture archiving and communication systems (PACS) are becoming increasingly widespread. This leads to new demands on the integration of the individual, formerly independent information systems (RIS, modalities, PACS). Possible ways of integrating individual systems are introduced. Besides the detailed description of different realizations of system communication, its role in the PACS at the university hospital in Freiburg is explained. The integration of different information systems still requires the use of proprietary interfaces. An appropriate integration generally has been realized in Freiburg. In the near future DICOM basic worklist management will standardize system integration and render an interdepartmental workflow concept possible. Even though an available communication standard exists, not all problems in the RIS-modality interface are solved. Different data models in the various RI systems and modalities demand certain degrees of freedom in the standard. Thus a satisfactory workflow cannot be guaranteed even when all involved systems conform with the standard. (orig.) [de

  18. Entitlement Can Both Decrease and Increase Consumer Susceptibility to Social Influence

    NARCIS (Netherlands)

    van der Heide, Martine; Fennis, Bob; van Ittersum, Koert; Trampe, Debra; Diehl, Kristin; Yoon, Carolyn

    2015-01-01

    Two studies indicate that entitlement—a sense that one deserves special treatment and is exempt from normal social demands—can both buffer and boost consumers’ proneness to social influence. Specifically, Study 1 shows that entitlement reduces susceptibility to consistency appeals. Study 2, however,

  19. Social Vulnerability to Climate Change and the Architecture of Entitlements

    International Nuclear Information System (INIS)

    Adger, W.N.; Kelly, P.M.

    1999-01-01

    The objective of this paper is to outline a conceptual model of vulnerability to climate change as the first step in appraising and understanding the social and economic processes which facilitate and constrain adaptation. Vulnerability as defined here pertains to individuals and social groups. It is the state of individuals, of groups, of communities defined in terms of their ability to cope with and adapt to any external stress placed on their livelihoods and well-being. This proposed approach puts the social and economic well-being of society at the centre of the analysis, thereby reversing the central focus of approaches to climate impact assessment based on impacts on and the adaptability of natural resources or ecosystems and which only subsequently address consequences for human well-being. The vulnerability or security of any group is determined by the availability of resources and, crucially, by the entitlement of individuals and groups to call on these resources. This perspective extends the concept of entitlements developed within neoclassical and institutional economics. Within this conceptual framework, vulnerability can be seen as a socially-constructed phenomenon influenced by institutional and economic dynamics. The study develops proxy indicators of vulnerability related to the structure of economic relations and the entitlements which govern them, and shows how these can be applied to a District in coastal lowland Vietnam. This paper outlines the lessons of such an approach to social vulnerability for the assessment of climate change at the global scale. We argue that the socio-economic and biophysical processes that determine vulnerability are manifest at the local, national, regional and global level but the state of vulnerability itself is associated with a specific population. Aggregation one level to another is therefore not appropriate and global-scale analysis is meaningful only in so far as it deals with the vulnerability of the global

  20. The IceCube Data Acquisition Software: Lessons Learned during Distributed, Collaborative, Multi-Disciplined Software Development.

    Energy Technology Data Exchange (ETDEWEB)

    Beattie, Keith S; Beattie, Keith; Day Ph.D., Christopher; Glowacki, Dave; Hanson Ph.D., Kael; Jacobsen Ph.D., John; McParland, Charles; Patton Ph.D., Simon

    2007-09-21

    In this experiential paper we report on lessons learned during the development ofthe data acquisition software for the IceCube project - specifically, how to effectively address the unique challenges presented by a distributed, collaborative, multi-institutional, multi-disciplined project such as this. While development progress in software projects is often described solely in terms of technical issues, our experience indicates that non- and quasi-technical interactions play a substantial role in the effectiveness of large software development efforts. These include: selection and management of multiple software development methodologies, the effective useof various collaborative communication tools, project management structure and roles, and the impact and apparent importance of these elements when viewed through the differing perspectives of hardware, software, scientific and project office roles. Even in areas clearly technical in nature, success is still influenced by non-technical issues that can escape close attention. In particular we describe our experiences on software requirements specification, development methodologies and communication tools. We make observations on what tools and techniques have and have not been effective in this geographically disperse (including the South Pole) collaboration and offer suggestions on how similarly structured future projects may build upon our experiences.

  1. Columbia River System Operation Review final environmental impact statement. Appendix P: Canadian Entitlement Allocation Agreements (CEAA)

    International Nuclear Information System (INIS)

    1995-11-01

    The System Operation Review (SOR) is a study and environmental compliance process being used by the three Federal agencies to analyze future operations of the system and river use issues. The goal of the SOR is to achieve a coordinated system operation strategy for the river that better meets the needs of all river users. This technical appendix addresses only the effects of alternative system operating strategies for managing the Columbia River system. The purpose of this technical appendix is to provide the environmental review necessary to enter into agreements regarding the distribution between Federal and non-Federal project owners with respect to delivery of the Canadian Entitlement obligation to Canada for the period 1998 through 2024

  2. Software With Strong Ties to Space

    Science.gov (United States)

    2003-01-01

    TieFlow is a simple but powerful business process improvement solution. It can automate and simplify any generic or industry-specific work process, helping organizations to transform work inefficiencies and internal operations involving people, paper, and procedures into a streamlined, well-organized, electronicbased process. TieFlow increases business productivity by improving process cycle times. The software can expedite generic processes in the areas of product design and development, purchase orders, expense reports, benefits enrollment, budgeting, hiring, and sales. It can also shore up vertical market processes such as claims processing, loan application and processing, health care administration, contract management, and advertising agency traffic. The processes can be easily and rapidly captured in a graphical manner and enforced together with rules pertaining to assignments that need to be performed. Aside from boosting productivity, TieFlow also reduces organizational costs and errors. TieFlow was developed with Small Business Innovation Research (SBIR) assistance from Johnson. The SBIR support entitles all Federal Government agencies to utilize the TieFlow software technology free of charge. Tietronix emphasizes that TieFlow is an outstanding workflow resource that could produce dramatic productivity and cost improvements for all agencies, just as it has done and continues to do for NASA. The Space Agency is currently using the software throughout several mission-critical offices, including the Mission Operations Directorate and the Flight Director s Office, for worldwide participation of authorized users in NASA processes. At the Flight Director s Office, TieFlow allows personnel to electronically submit and review changes to the flight rules carried out during missions.

  3. 12 CFR 987.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... BOOK-ENTRY PROCEDURE FOR CONSOLIDATED OBLIGATIONS § 987.4 Creation of Participant's Security... of the United States to secure deposits of public money, including, without limitation, deposits to...

  4. 38 CFR 3.274 - Relationship of net worth to pension entitlement.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Relationship of net worth to pension entitlement. 3.274 Section 3.274 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS ADJUDICATION Pension, Compensation, and Dependency and Indemnity Compensation Regulations...

  5. 24 CFR 350.5 - Creation of Participant's Security Entitlement; Security Interests.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Creation of Participant's Security... AND URBAN DEVELOPMENT BOOK-ENTRY PROCEDURES § 350.5 Creation of Participant's Security Entitlement... States to secure deposits of public money, including without limitation deposits to the Treasury tax and...

  6. Softwarization of Mobile Network Functions towards Agile and Energy Efficient 5G Architectures: A Survey

    Directory of Open Access Journals (Sweden)

    Dlamini Thembelihle

    2017-01-01

    Full Text Available Future mobile networks (MNs are required to be flexible with minimal infrastructure complexity, unlike current ones that rely on proprietary network elements to offer their services. Moreover, they are expected to make use of renewable energy to decrease their carbon footprint and of virtualization technologies for improved adaptability and flexibility, thus resulting in green and self-organized systems. In this article, we discuss the application of software defined networking (SDN and network function virtualization (NFV technologies towards softwarization of the mobile network functions, taking into account different architectural proposals. In addition, we elaborate on whether mobile edge computing (MEC, a new architectural concept that uses NFV techniques, can enhance communication in 5G cellular networks, reducing latency due to its proximity deployment. Besides discussing existing techniques, expounding their pros and cons and comparing state-of-the-art architectural proposals, we examine the role of machine learning and data mining tools, analyzing their use within fully SDN- and NFV-enabled mobile systems. Finally, we outline the challenges and the open issues related to evolved packet core (EPC and MEC architectures.

  7. MoZis: mobile zoo information system: a case study for the city of Osnabrueck

    Science.gov (United States)

    Michel, Ulrich

    2007-10-01

    This paper describes a new project of the Institute for Geoinformatics and Remote Sensing, funded by the German Federal Foundation for the Environment (DBU, Deutsche Bundesstiftung Umwelt www.dbu.de). The goal of this project is to develop a mobile zoo information system for Pocket PCs and Smart phones. Visitors of the zoo will be able to use their own mobile devices or use Pocket PCs, which could be borrowed from the zoo to navigate around the zoo's facilities. The system will also provide additional multimedia based information such as audio-based material, animal video clips, and maps of their natural habitat. People could have access to the project at the zoo via wireless local area network or by downloading the necessary files using a home internet connection. Our software environment consists of proprietary and non-proprietary software solutions in order to make it as flexible as possible. Our first prototype was developed with Visual Studio 2003 and Visual Basic.Net.

  8. A Longitudinal Study of Sexual Entitlement and Self-Efficacy among Young Women and Men: Gender Differences and Associations with Age and Sexual Experience

    Directory of Open Access Journals (Sweden)

    Gillian Hewitt-Stubbs

    2016-01-01

    Full Text Available Many scholars have called for an increased focus on positive aspects of sexual health and sexuality. Using a longitudinal design with two assessments, we investigated patterns of entitlement to sexual partner pleasure and self-efficacy to achieve sexual pleasure among 295 young men and women aged 17–25 years attending one Australian university. We also tested whether entitlement and efficacy differed by gender, and hypothesized that entitlement and efficacy would be higher in older participants and those with more sexual experience. A sense of entitlement to sexual partner pleasure increased significantly over the year of the study, whereas, on average, there was no change in self-efficacy over time. At Time 1 (T1, young women reported more entitlement than young men. Age was positively associated with T1 entitlement, and experience with a wider range of partnered sexual behaviors was concurrently associated with more entitlement and efficacy and was also associated with increased entitlement to partner pleasure and increased self-efficacy in achieving sexual pleasure at T2 relative to T1. A group with the least amount of sexual experience was particularly low in entitlement and efficacy when compared to groups with a history of coital experience. There was no evidence that any association differed between young men and young women. Limitations of the study include a sample of predominantly middle class, Caucasian students at one university and the possibility that students more interested in sex and relationships, and with more sexual experience, chose to participate.

  9. A Longitudinal Study of Sexual Entitlement and Self-Efficacy among Young Women and Men: Gender Differences and Associations with Age and Sexual Experience

    Science.gov (United States)

    Hewitt-Stubbs, Gillian; Zimmer-Gembeck, Melanie J.; Mastro, Shawna; Boislard, Marie-Aude

    2016-01-01

    Many scholars have called for an increased focus on positive aspects of sexual health and sexuality. Using a longitudinal design with two assessments, we investigated patterns of entitlement to sexual partner pleasure and self-efficacy to achieve sexual pleasure among 295 young men and women aged 17–25 years attending one Australian university. We also tested whether entitlement and efficacy differed by gender, and hypothesized that entitlement and efficacy would be higher in older participants and those with more sexual experience. A sense of entitlement to sexual partner pleasure increased significantly over the year of the study, whereas, on average, there was no change in self-efficacy over time. At Time 1 (T1), young women reported more entitlement than young men. Age was positively associated with T1 entitlement, and experience with a wider range of partnered sexual behaviors was concurrently associated with more entitlement and efficacy and was also associated with increased entitlement to partner pleasure and increased self-efficacy in achieving sexual pleasure at T2 relative to T1. A group with the least amount of sexual experience was particularly low in entitlement and efficacy when compared to groups with a history of coital experience. There was no evidence that any association differed between young men and young women. Limitations of the study include a sample of predominantly middle class, Caucasian students at one university and the possibility that students more interested in sex and relationships, and with more sexual experience, chose to participate. PMID:26797642

  10. Reversal of visceral hypersensitivity in rat by Menthacarin , a proprietary combination of essential oils from peppermint and caraway, coincides with mycobiome modulation

    NARCIS (Netherlands)

    Botschuijver, S.; Welting, O.; Levin, E.; Maria-Ferreira, D.; Koch, E.; Montijn, R. C.; Seppen, J.; Hakvoort, T. B. M.; Schuren, F. H. J.; de Jonge, W. J.; van den Wijngaard, R. M.

    2018-01-01

    Irritable bowel syndrome (IBS) is a common gastrointestinal disorder associated with altered gastrointestinal microflora and increased nociception to colonic distension. This visceral hypersensitivity can be reversed in our rat maternal separation model by fungicides. Menthacarin is a proprietary

  11. SWEBOS – The Software Engineering Body of Skills

    Directory of Open Access Journals (Sweden)

    Yvonne Sedelmaier

    2015-02-01

    Full Text Available The development of complex software systems requires a mixture of various technical and non-technical competencies. While some guidelines exist which technical knowledge is required to make a good software engineer, there is a lack of insight as to which non-technical or soft skills are necessary to master complex software projects. This paper proposes a body of skills (SWEBOS for soft-ware engineering. The collection of necessary skills is developed on the basis of a clear, data-driven research design. The resulting required soft skills for software engineering are described precisely and semantically rich in a three-level structure. This approach guarantees that skills are not just characterized in a broad and general manner, but rather they are specifically adapted to the domain of software engineering.

  12. CONRAD—A software framework for cone-beam imaging in radiology

    International Nuclear Information System (INIS)

    Maier, Andreas; Choi, Jang-Hwan; Riess, Christian; Keil, Andreas; Fahrig, Rebecca; Hofmann, Hannes G.; Berger, Martin; Fischer, Peter; Schwemmer, Chris; Wu, Haibo; Müller, Kerstin; Hornegger, Joachim

    2013-01-01

    Purpose: In the community of x-ray imaging, there is a multitude of tools and applications that are used in scientific practice. Many of these tools are proprietary and can only be used within a certain lab. Often the same algorithm is implemented multiple times by different groups in order to enable comparison. In an effort to tackle this problem, the authors created CONRAD, a software framework that provides many of the tools that are required to simulate basic processes in x-ray imaging and perform image reconstruction with consideration of nonlinear physical effects.Methods: CONRAD is a Java-based state-of-the-art software platform with extensive documentation. It is based on platform-independent technologies. Special libraries offer access to hardware acceleration such as OpenCL. There is an easy-to-use interface for parallel processing. The software package includes different simulation tools that are able to generate up to 4D projection and volume data and respective vector motion fields. Well known reconstruction algorithms such as FBP, DBP, and ART are included. All algorithms in the package are referenced to a scientific source.Results: A total of 13 different phantoms and 30 processing steps have already been integrated into the platform at the time of writing. The platform comprises 74.000 nonblank lines of code out of which 19% are used for documentation. The software package is available for download at http://conrad.stanford.edu. To demonstrate the use of the package, the authors reconstructed images from two different scanners, a table top system and a clinical C-arm system. Runtimes were evaluated using the RabbitCT platform and demonstrate state-of-the-art runtimes with 2.5 s for the 256 problem size and 12.4 s for the 512 problem size.Conclusions: As a common software framework, CONRAD enables the medical physics community to share algorithms and develop new ideas. In particular this offers new opportunities for scientific collaboration and

  13. What Are Occupational Pension Plan Entitlements Worth in Britain?

    OpenAIRE

    Disney, Richard; Whitehouse, Edward

    1996-01-01

    The acquisition of rights by workers in private pension plans underpins retirement behavior, recruitment policy, and wage structure but there is controversy as to how these individual pension rights should be valued. The paper combines four data-sets to calculate pension entitlements for a sample of 3,000 British workers in 1987. Expected scheme tenure is a key variable in valuation; younger workers and women face greater initial uncertainty as to their pension outcomes, which is resolved as ...

  14. Narcissistic self-esteem or optimal self-esteem? A Latent Profile Analysis of self-esteem and psychological entitlement

    OpenAIRE

    Stronge, Sam; Cichocka, Aleksandra; Sibley, Chris G.

    2016-01-01

    Research into the relationship between self-esteem and narcissism has produced conflicting results, potentially caused by hidden subpopulations that exhibit distinct positive or negative associations. This research uses Latent Profile Analysis to identify profiles within a national panel study (N = 6,471) with differing relationships between psychological entitlement and self-esteem. We identified a narcissistic self-esteem profile (9%) characterised by high entitlement and high self-esteem, ...

  15. 75 FR 69521 - Evidence for Transfer of Entitlement of Education Benefits; Correction

    Science.gov (United States)

    2010-11-12

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0708] Evidence for Transfer of Entitlement of Education Benefits; Correction AGENCY: Veterans Benefits Administration, Department of Veterans Affairs. ACTION: Notice; correction. SUMMARY: The Department of Veterans Affairs (VA) published a collection of...

  16. College instruction is not so stress free after all: A qualitative and quantitative study of academic entitlement, uncivil behaviors, and instructor strain and burnout.

    Science.gov (United States)

    Jiang, Lixin; Tripp, Thomas M; Hong, Phan Y

    2017-12-01

    The vast majority of today's college students are millennials, who have traits of confidence, tolerance, but also of entitlement and narcissism (Twenge, 2006). Therefore, college instructors face a unique challenge: dealing with the requests from academically entitled students, who have unreasonable expectations of receiving academic success, regardless of performance (Chowning & Campbell, 2009). We conducted two studies to examine whether student academic entitlement would increase instructors' strain and burnout via uncivil behaviors. A qualitative inquiry asked 136 instructors with college-teaching experience to describe types of behaviors entitled students display, their responses to entitled students, and the influence of these interactions on instructors' well-being. Next, a quantitative study with data from 857 college students nested in 34 instructors tested a multilevel mediation model where students' academic entitlement was related to instructor-reported uncivil behaviors, which in turn related to instructors' strain and burnout. Both studies largely support our hypothesis that uncivil behaviors fully mediate the relationship between students' academic entitlement and instructors' strain and burnout. We recommend employing behavioral modification strategies to decrease uncivil behaviors (e.g., class rules regarding uncivil behaviors might be specified in the course syllabus and consistently enforced) because academic entitlement attitudes are largely stable beliefs and thus may be less amenable to modification. Copyright © 2017 John Wiley & Sons, Ltd.

  17. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-07-01

    ... REGULATIONS GOVERNING BOOK-ENTRY SECURITIES OF THE STUDENT LOAN MARKETING ASSOCIATION (SALLIE MAE) § 354.4... Entitlement is created when a Federal Reserve Bank indicates by book-entry that a Book-entry Sallie Mae... the books of a Federal Reserve Bank is thereby effected and perfected, and has priority over any other...

  18. The mod industries? The industrial logic of non-market game production

    OpenAIRE

    2008-01-01

    Abstract This article seeks to make the relationship between non-market game developers (modders) and the game developer company explicit through game technology. It investigates a particular type of modding, i.e. total conversion mod teams, whose organization can be said to conform to the high-risk, technologically-advanced, capital-intensive, proprietary practice of the developer company. The notion ...

  19. PENGGUNAAN ALGORITMA NEWTON – RAPHSON UNTUK MEMBUAT SOFTWARE PENENTUAN DOSIS OBAT

    Directory of Open Access Journals (Sweden)

    Ibnu Gunawan

    2009-01-01

    Full Text Available USCPACK Software from University of Carolina is one of the pioneers of computerized drug dosage system. This software uses Bayesian method. The algorithm that used in this software is known as NPEM (Non Parametric Expectation Maximization. After knowing how USCPACK work, then we made new software that has the same use like USCPACK but with new algorithm that different from NPEM. These paper will describe the how to make the software based on NPAG algorithm. Abstract in Bahasa Indonesia: Software USCPACK buatan University of Carolina merupakan salah satu pelopor dimungkinkannya penentuan dosis obat persatuan waktu tertentu untuk pasien secara umum menggunakan komputer. Software ini bekerja dengan menggunakan metode dasar Bayesian. Algoritma yang digunakan oleh software ini adalah NPEM (Non Parametric Expectation Maximization. Setelah mengetahui cara kerja dari USCPACK maka dibuatlah sebuah software pendosisan obat menggunakan algoritma non parametrik lain selain NPEM. Paper ini akan membahas pembuatan software pendosisan obat menggunakan algoritma newton – raphson dalam penentuan dosis obat terkomputerisasi. Kata kunci: Pendosisan terkomputerisasi, optimasi, Bayesian, NPEM, Newton Raphson,USCPACK

  20. Fighting Software Piracy: Some Global Conditional Policy Instruments

    OpenAIRE

    Asongu, Simplice A; Singh, Pritam; Le Roux, Sara

    2016-01-01

    This study examines the efficiency of tools for fighting software piracy in the conditional distributions of software piracy. Our paper examines software piracy in 99 countries for the period 1994-2010, using contemporary and non-contemporary quantile regressions. The intuition for modelling distributions contingent on existing levels of software piracy is that the effectiveness of tools against piracy may consistently decrease or increase simultaneously with increasing levels of software pir...

  1. 20 CFR 404.1928 - Effect of the alien non-payment provision.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Effect of the alien non-payment provision... the alien non-payment provision. An agreement may provide that a person entitled to benefits under... party to the agreement, regardless of the alien non-payment provision (see § 404.460). ...

  2. Software Startups - A Research Agenda

    Directory of Open Access Journals (Sweden)

    Michael Unterkalmsteiner

    2016-10-01

    Full Text Available Software startup companies develop innovative, software-intensive products within limited time frames and with few resources, searching for sustainable and scalable business models. Software startups are quite distinct from traditional mature software companies, but also from micro-, small-, and medium-sized enterprises, introducing new challenges relevant for software engineering research. This paper's research agenda focuses on software engineering in startups, identifying, in particular, 70+ research questions in the areas of supporting startup engineering activities, startup evolution models and patterns, ecosystems and innovation hubs, human aspects in software startups, applying startup concepts in non-startup environments, and methodologies and theories for startup research. We connect and motivate this research agenda with past studies in software startup research, while pointing out possible future directions. While all authors of this research agenda have their main background in Software Engineering or Computer Science, their interest in software startups broadens the perspective to the challenges, but also to the opportunities that emerge from multi-disciplinary research. Our audience is therefore primarily software engineering researchers, even though we aim at stimulating collaborations and research that crosses disciplinary boundaries. We believe that with this research agenda we cover a wide spectrum of the software startup industry current needs.

  3. Open source software in a practical approach for post processing of radiologic images.

    Science.gov (United States)

    Valeri, Gianluca; Mazza, Francesco Antonino; Maggi, Stefania; Aramini, Daniele; La Riccia, Luigi; Mazzoni, Giovanni; Giovagnoni, Andrea

    2015-03-01

    The purpose of this paper is to evaluate the use of open source software (OSS) to process DICOM images. We selected 23 programs for Windows and 20 programs for Mac from 150 possible OSS programs including DICOM viewers and various tools (converters, DICOM header editors, etc.). The programs selected all meet the basic requirements such as free availability, stand-alone application, presence of graphical user interface, ease of installation and advanced features beyond simple display monitor. Capabilities of data import, data export, metadata, 2D viewer, 3D viewer, support platform and usability of each selected program were evaluated on a scale ranging from 1 to 10 points. Twelve programs received a score higher than or equal to eight. Among them, five obtained a score of 9: 3D Slicer, MedINRIA, MITK 3M3, VolView, VR Render; while OsiriX received 10. OsiriX appears to be the only program able to perform all the operations taken into consideration, similar to a workstation equipped with proprietary software, allowing the analysis and interpretation of images in a simple and intuitive way. OsiriX is a DICOM PACS workstation for medical imaging and software for image processing for medical research, functional imaging, 3D imaging, confocal microscopy and molecular imaging. This application is also a good tool for teaching activities because it facilitates the attainment of learning objectives among students and other specialists.

  4. Systems and Methods for Decoy Routing and Convert Channel Bonding

    Science.gov (United States)

    2013-11-26

    34 Proc. R. Soc. A, vol. 463, Jan. 12, 2007, pp. 1-16. " Stupid censorship Web Proxy," http://www.stupidcensorship.com/, retrieved from the internet on...services such as those offered by Google or Skype, web or microblogs such as Twitter, various social media services such as Face- book, and file...device (e.g., Skype, Google , Jabber, Firefox) to be directed to the proprietary software for processing. For instance, the proprietary software of

  5. A Method of Nuclear Software Reliability Estimation

    International Nuclear Information System (INIS)

    Park, Gee Yong; Eom, Heung Seop; Cheon, Se Woo; Jang, Seung Cheol

    2011-01-01

    A method on estimating software reliability for nuclear safety software is proposed. This method is based on the software reliability growth model (SRGM) where the behavior of software failure is assumed to follow the non-homogeneous Poisson process. Several modeling schemes are presented in order to estimate and predict more precisely the number of software defects based on a few of software failure data. The Bayesian statistical inference is employed to estimate the model parameters by incorporating the software test cases into the model. It is identified that this method is capable of accurately estimating the remaining number of software defects which are on-demand type directly affecting safety trip functions. The software reliability can be estimated from a model equation and one method of obtaining the software reliability is proposed

  6. PROTEINCHALLENGE: Crowd sourcing in proteomics analysis and software development

    DEFF Research Database (Denmark)

    Martin, Sarah F.; Falkenberg, Heiner; Dyrlund, Thomas Franck

    2013-01-01

    , including arguments for community-wide open source software development and “big data” compatible solutions for the future. For the meantime, we have laid out ten top tips for data processing. With these at hand, a first large-scale proteomics analysis hopefully becomes less daunting to navigate......, with the aim of setting a community-driven gold standard for data handling, reporting and sharing. This article is part of a Special Issue entitled: New Horizons and Applications for Proteomics [EuPA 2012].......In large-scale proteomics studies there is a temptation, after months of experimental work, to plug resulting data into a convenient—if poorly implemented—set of tools, which may neither do the data justice nor help answer the scientific question. In this paper we have captured key concerns...

  7. A Full-Featured User Friendly CO2-EOR and Sequestration Planning Software

    Energy Technology Data Exchange (ETDEWEB)

    Savage, Bill [Nitec LLC, Denver, CO (United States)

    2013-11-30

    A Full-Featured, User Friendly CO2-EOR and Sequestration Planning Software This project addressed the development of an integrated software solution that includes a graphical user interface, numerical simulation, visualization tools and optimization processes for reservoir simulation modeling of CO2-EOR. The objective was to assist the industry in the development of domestic energy resources by expanding the application of CO2-EOR technologies, and ultimately to maximize the CO2} sequestration capacity of the U.S. The software resulted in a field-ready application for the industry to address the current CO2-EOR technologies. The software has been made available to the public without restrictions and with user friendly operating documentation and tutorials. The software (executable only) can be downloaded from NITEC’s website at www.nitecllc.com. This integrated solution enables the design, optimization and operation of CO2-EOR processes for small and mid-sized operators, who currently cannot afford the expensive, time intensive solutions that the major oil companies enjoy. Based on one estimate, small oil fields comprise 30% of the of total economic resource potential for the application of CO2-EOR processes in the U.S. This corresponds to 21.7 billion barrels of incremental, technically recoverable oil using the current “best practices”, and 31.9 billion barrels using “next-generation” CO2-EOR techniques. The project included a Case Study of a prospective CO2-EOR candidate field in Wyoming by a small independent, Linc Energy Petroleum Wyoming, Inc. NITEC LLC has an established track record of developing innovative and user friendly software. The Principle Investigator is an experienced manager and engineer with expertise in software development, numerical techniques, and GUI applications. Unique, presently-proprietary NITEC technologies have been integrated

  8. Model-driven dependability assessment of software systems

    CERN Document Server

    Bernardi, Simona; Petriu, Dorina C

    2013-01-01

    In this book, the authors present cutting-edge model-driven techniques for modeling and analysis of software dependability. Most of them are based on the use of UML as software specification language. From the software system specification point of view, such techniques exploit the standard extension mechanisms of UML (i.e., UML profiling). UML profiles enable software engineers to add non-functional properties to the software model, in addition to the functional ones. The authors detail the state of the art on UML profile proposals for dependability specification and rigorously describe the t

  9. Informing resource-poor populations and the delivery of entitled health and social services in rural India: a cluster randomized controlled trial.

    Science.gov (United States)

    Pandey, Priyanka; Sehgal, Ashwini R; Riboud, Michelle; Levine, David; Goyal, Madhav

    2007-10-24

    A lack of awareness about entitled health and social services may contribute to poor delivery of such services in developing countries, especially among individuals of low socioeconomic status. To determine the impact of informing resource-poor rural populations about entitled services. Community-based, cluster randomized controlled trial conducted from May 2004 to May 2005 in 105 randomly selected village clusters in Uttar Pradesh state in India. Households (548 intervention and 497 control) were selected by a systematic sampling design, including both low-caste and mid- to high-caste households. Four to 6 public meetings were held in each intervention village cluster to disseminate information on entitled health services, entitled education services, and village governance requirements. No intervention took place in control village clusters. Visits by nurse midwife; prenatal examinations, tetanus vaccinations, and prenatal supplements received by pregnant women; vaccinations received by infants; excess school fees charged; occurrence of village council meetings; and development work in villages. At baseline, there were no significant differences in self-reported delivery of health and social services. After 1 year, intervention villagers reported better delivery of several services compared with control villagers: in a multivariate analysis, 30% more prenatal examinations (95% confidence interval [CI], 17%-43%; P India about entitled services enhanced the delivery of health and social services among both low- and mid- to high-caste households. Interventions that emphasize educating resource-poor populations about entitled services may improve the delivery of such services. clinicaltrials.gov Identifier: NCT00421291.

  10. Mirion--a software package for automatic processing of mass spectrometric images.

    Science.gov (United States)

    Paschke, C; Leisner, A; Hester, A; Maass, K; Guenther, S; Bouschen, W; Spengler, B

    2013-08-01

    Mass spectrometric imaging (MSI) techniques are of growing interest for the Life Sciences. In recent years, the development of new instruments employing ion sources that are tailored for spatial scanning allowed the acquisition of large data sets. A subsequent data processing, however, is still a bottleneck in the analytical process, as a manual data interpretation is impossible within a reasonable time frame. The transformation of mass spectrometric data into spatial distribution images of detected compounds turned out to be the most appropriate method to visualize the results of such scans, as humans are able to interpret images faster and easier than plain numbers. Image generation, thus, is a time-consuming and complex yet very efficient task. The free software package "Mirion," presented in this paper, allows the handling and analysis of data sets acquired by mass spectrometry imaging. Mirion can be used for image processing of MSI data obtained from many different sources, as it uses the HUPO-PSI-based standard data format imzML, which is implemented in the proprietary software of most of the mass spectrometer companies. Different graphical representations of the recorded data are available. Furthermore, automatic calculation and overlay of mass spectrometric images promotes direct comparison of different analytes for data evaluation. The program also includes tools for image processing and image analysis.

  11. Can a sense of entitlement increase stealing?

    DEFF Research Database (Denmark)

    Gravert, Christina Annette

    Are people more likely to steal when the payoff they deserve is determined randomly or when it depends on their performance in a difficult task? In this paper I investigate how the probability of stealing is affected by the way in which payoff is earned. After answering a short survey one group...... to take the (undeserved) maximum payoff than the participants in the random payment scheme. In contrast to previous findings in the cheating literature, stealing is an all-or-nothing decision rather than a trade-off between a slightly higher payoff and the desire to keep ones moral values intact....... The results support the theory that unethical behavior is increased by a sense of entitlement, which is more pronounced when wealth depends on performance than on the roll of a die....

  12. Student Entitlement Models in Australia's National Training System: Expert Views. Occasional Paper

    Science.gov (United States)

    Bowman, Kaye; McKenna, Suzy

    2016-01-01

    This occasional paper provides the views of 17 "thought leaders" in the Australian vocational education and training (VET) sector. Their insight and opinions were sought to inform a larger research project focused on the student entitlement reforms that were introduced into the national VET system from 2012. These individuals offered a…

  13. Opening up Library Automation Software

    Science.gov (United States)

    Breeding, Marshall

    2009-01-01

    Throughout the history of library automation, the author has seen a steady advancement toward more open systems. In the early days of library automation, when proprietary systems dominated, the need for standards was paramount since other means of inter-operability and data exchange weren't possible. Today's focus on Application Programming…

  14. 14 CFR 415.123 - Computing systems and software.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Computing systems and software. 415.123... Launch Vehicle From a Non-Federal Launch Site § 415.123 Computing systems and software. (a) An applicant's safety review document must describe all computing systems and software that perform a safety...

  15. Entitlement to Sickness Benefits in Sweden: The Social Insurance Officers Experiences

    Directory of Open Access Journals (Sweden)

    Ulrika Müssener

    2008-01-01

    Full Text Available Background: Social insurance offices (SIOs handle a wide range of complex assessments of the entitlement to sickness benefits for an increasing number of clients on sick leave and consequently, the demands on the SIOs have increased considerably.Aim: To gain deeper knowledge of the problems experienced by the SIOs in their work associated with entitlement to sickness benefits.Method: A descriptive and explorative qualitative approach was used to analyse data from two focus-group interviews, including six participants in each group.Results: The participants discussed different dilemmas in regard to; physicians’ responsibility for issuing sickness certificates, interactions with the insured individuals, disclosure of decisions, communications with medical consultants, documentation of sickness benefit claims, threats in the workplace, as well as their own competence. The SIOs regarded incomplete information on sickness certificates as a main problem, because they frequently had to contact the client and the physicians who issued the certificates in order to obtain further details, leading to delays in the decision-making whether to grant sickness benefits.Conclusions: More knowledge regarding SIOs work is required to improve the methods used in the sickness insurance system and to ensure adequate training of new staff members.

  16. Remote software upload techniques in future vehicles and their performance analysis

    Science.gov (United States)

    Hossain, Irina

    Updating software in vehicle Electronic Control Units (ECUs) will become a mandatory requirement for a variety of reasons, for examples, to update/fix functionality of an existing system, add new functionality, remove software bugs and to cope up with ITS infrastructure. Software modules of advanced vehicles can be updated using Remote Software Upload (RSU) technique. The RSU employs infrastructure-based wireless communication technique where the software supplier sends the software to the targeted vehicle via a roadside Base Station (BS). However, security is critically important in RSU to avoid any disasters due to malfunctions of the vehicle or to protect the proprietary algorithms from hackers, competitors or people with malicious intent. In this thesis, a mechanism of secure software upload in advanced vehicles is presented which employs mutual authentication of the software provider and the vehicle using a pre-shared authentication key before sending the software. The software packets are sent encrypted with a secret key along with the Message Digest (MD). In order to increase the security level, it is proposed the vehicle to receive more than one copy of the software along with the MD in each copy. The vehicle will install the new software only when it receives more than one identical copies of the software. In order to validate the proposition, analytical expressions of average number of packet transmissions for successful software update is determined. Different cases are investigated depending on the vehicle's buffer size and verification methods. The analytical and simulation results show that it is sufficient to send two copies of the software to the vehicle to thwart any security attack while uploading the software. The above mentioned unicast method for RSU is suitable when software needs to be uploaded to a single vehicle. Since multicasting is the most efficient method of group communication, updating software in an ECU of a large number of vehicles

  17. 5 CFR 1651.2 - Entitlement to funds in a deceased participant's account.

    Science.gov (United States)

    2010-01-01

    ... BOARD DEATH BENEFITS § 1651.2 Entitlement to funds in a deceased participant's account. (a) Death... participant will be paid as a death benefit to the individual or individuals surviving the participant, in the... representation in accordance with § 1651.6; (4) If there are no beneficiaries or persons as described in...

  18. Measuring policy entitlements at the micro-level: maternity and parental leave in Europe

    NARCIS (Netherlands)

    Bártová, A.; Emery, T.

    2018-01-01

    Comparative social policy analysis has been shaped by the measurement of policy as a macro phenomenon. However, social policy theories have consistently asserted that policy entitlements vary across class, gender, ethnicity and the life-course. This paper synthesises a number of innovations to

  19. Selection of software for mechanical engineering undergraduates

    International Nuclear Information System (INIS)

    Cheah, C. T.; Yin, C. S.; Halim, T.; Naser, J.; Blicblau, A. S.

    2016-01-01

    A major problem with the undergraduate mechanical course is the limited exposure of students to software packages coupled with the long learning curve on the existing software packages. This work proposes the use of appropriate software packages for the entire mechanical engineering curriculum to ensure students get sufficient exposure real life design problems. A variety of software packages are highlighted as being suitable for undergraduate work in mechanical engineering, e.g. simultaneous non-linear equations; uncertainty analysis; 3-D modeling software with the FEA; analysis tools for the solution of problems in thermodynamics, fluid mechanics, mechanical system design, and solid mechanics.

  20. Selection of software for mechanical engineering undergraduates

    Energy Technology Data Exchange (ETDEWEB)

    Cheah, C. T.; Yin, C. S.; Halim, T.; Naser, J.; Blicblau, A. S., E-mail: ablicblau@swin.edu.au [Swinburne University of Technology, Faculty of Science Engineering and Technology, PO Box 218 Hawthorn, Victoria, Australia, 3122 (Australia)

    2016-07-12

    A major problem with the undergraduate mechanical course is the limited exposure of students to software packages coupled with the long learning curve on the existing software packages. This work proposes the use of appropriate software packages for the entire mechanical engineering curriculum to ensure students get sufficient exposure real life design problems. A variety of software packages are highlighted as being suitable for undergraduate work in mechanical engineering, e.g. simultaneous non-linear equations; uncertainty analysis; 3-D modeling software with the FEA; analysis tools for the solution of problems in thermodynamics, fluid mechanics, mechanical system design, and solid mechanics.

  1. Security System Software

    Science.gov (United States)

    1993-01-01

    C Language Integration Production System (CLIPS), a NASA-developed expert systems program, has enabled a security systems manufacturer to design a new generation of hardware. C.CURESystem 1 Plus, manufactured by Software House, is a software based system that is used with a variety of access control hardware at installations around the world. Users can manage large amounts of information, solve unique security problems and control entry and time scheduling. CLIPS acts as an information management tool when accessed by C.CURESystem 1 Plus. It asks questions about the hardware and when given the answer, recommends possible quick solutions by non-expert persons.

  2. Analysis of lipid experiments (ALEX: a software framework for analysis of high-resolution shotgun lipidomics data.

    Directory of Open Access Journals (Sweden)

    Peter Husen

    Full Text Available Global lipidomics analysis across large sample sizes produces high-content datasets that require dedicated software tools supporting lipid identification and quantification, efficient data management and lipidome visualization. Here we present a novel software-based platform for streamlined data processing, management and visualization of shotgun lipidomics data acquired using high-resolution Orbitrap mass spectrometry. The platform features the ALEX framework designed for automated identification and export of lipid species intensity directly from proprietary mass spectral data files, and an auxiliary workflow using database exploration tools for integration of sample information, computation of lipid abundance and lipidome visualization. A key feature of the platform is the organization of lipidomics data in "database table format" which provides the user with an unsurpassed flexibility for rapid lipidome navigation using selected features within the dataset. To demonstrate the efficacy of the platform, we present a comparative neurolipidomics study of cerebellum, hippocampus and somatosensory barrel cortex (S1BF from wild-type and knockout mice devoid of the putative lipid phosphate phosphatase PRG-1 (plasticity related gene-1. The presented framework is generic, extendable to processing and integration of other lipidomic data structures, can be interfaced with post-processing protocols supporting statistical testing and multivariate analysis, and can serve as an avenue for disseminating lipidomics data within the scientific community. The ALEX software is available at www.msLipidomics.info.

  3. Analysis of lipid experiments (ALEX): a software framework for analysis of high-resolution shotgun lipidomics data.

    Science.gov (United States)

    Husen, Peter; Tarasov, Kirill; Katafiasz, Maciej; Sokol, Elena; Vogt, Johannes; Baumgart, Jan; Nitsch, Robert; Ekroos, Kim; Ejsing, Christer S

    2013-01-01

    Global lipidomics analysis across large sample sizes produces high-content datasets that require dedicated software tools supporting lipid identification and quantification, efficient data management and lipidome visualization. Here we present a novel software-based platform for streamlined data processing, management and visualization of shotgun lipidomics data acquired using high-resolution Orbitrap mass spectrometry. The platform features the ALEX framework designed for automated identification and export of lipid species intensity directly from proprietary mass spectral data files, and an auxiliary workflow using database exploration tools for integration of sample information, computation of lipid abundance and lipidome visualization. A key feature of the platform is the organization of lipidomics data in "database table format" which provides the user with an unsurpassed flexibility for rapid lipidome navigation using selected features within the dataset. To demonstrate the efficacy of the platform, we present a comparative neurolipidomics study of cerebellum, hippocampus and somatosensory barrel cortex (S1BF) from wild-type and knockout mice devoid of the putative lipid phosphate phosphatase PRG-1 (plasticity related gene-1). The presented framework is generic, extendable to processing and integration of other lipidomic data structures, can be interfaced with post-processing protocols supporting statistical testing and multivariate analysis, and can serve as an avenue for disseminating lipidomics data within the scientific community. The ALEX software is available at www.msLipidomics.info.

  4. Speech to Text Software Evaluation Report

    CERN Document Server

    Martins Santo, Ana Luisa

    2017-01-01

    This document compares out-of-box performance of three commercially available speech recognition software: Vocapia VoxSigma TM , Google Cloud Speech, and Lime- craft Transcriber. It is defined a set of evaluation criteria and test methods for speech recognition softwares. The evaluation of these softwares in noisy environments are also included for the testing purposes. Recognition accuracy was compared using noisy environments and languages. Testing in ”ideal” non-noisy environment of a quiet room has been also performed for comparison.

  5. Employee entitlements during pregnancy and maternal psychological well-being.

    Science.gov (United States)

    Cooklin, Amanda R; Rowe, Heather J; Fisher, Jane R W

    2007-12-01

    Antenatal psychological well-being is multifactorially determined, including by social circumstances. Evidence suggests that workplace conditions are salient determinants of mental health, but it is not known whether employment conditions influence antenatal psychological well-being. To investigate the relationship between employment conditions and antenatal psychological well-being in Australian women. A sociodemographically diverse consecutive cohort of employed nulliparous women was recruited in late pregnancy. Data were collected by a structured interview assessing sociodemographic characteristics, employment arrangements, experience of pregnancy-related discrimination, and access to maternity leave entitlements. Participants completed two standardised psychometric measures of maternal mood: the Edinburgh Depression Scale (EDS) and the Profile of Mood States (PoMS). Comparisons of self-reported mood were made between women by experience of workplace adversity, using a composite measure of workplace events. Of 205 eligible women, 165 agreed to participate. Of these, 114 of 165 (69%) reported at least one form of workplace adversity during pregnancy. More women without private health insurance (78%) reported workplace adversity than those who were privately insured (57%) (chi2(1)=6.95, P=0.008). Women experiencing workplace adversity had significantly worse psychological well-being as indicated by the EDS score (7.7+/-5.1) than those who were experiencing no workplace adversity (5.5+/-3.4), mean difference (95% CI)=-2.2 (-3.7 to -0.8), P=0.003. Similar results were reported for the PoMS. Workplace adversity during pregnancy is associated with poorer maternal psychological well-being. Workplace conditions and entitlements are salient factors for consideration in assessments of antenatal psychosocial well-being.

  6. Generation Me in the spotlight : Linking reality TV to materialism, entitlement, and narcissism

    NARCIS (Netherlands)

    Opree, S.J.; Kühne, R.

    2016-01-01

    Today’s youth, the Generation Me, is deemed materialistic, entitled, and narcissistic. Individuality has become an important value in child-rearing and is cultivated in the media—especially within the reality TV genre. The aim of this study was to investigate whether adolescents’ and emerging

  7. 41 CFR 302-2.3 - What determines my entitlements and allowances for relocation?

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 4 2010-07-01 2010-07-01 false What determines my entitlements and allowances for relocation? 302-2.3 Section 302-2.3 Public Contracts and Property Management Federal Travel Regulation System RELOCATION ALLOWANCES INTRODUCTION 2-EMPLOYEES ELIGIBILITY REQUIREMENTS...

  8. Is the Narcissistic Personality Inventory Still Relevant? A Test of Independent Grandiosity and Entitlement Scales in the Assessment of Narcissism

    Science.gov (United States)

    Miller, Joshua D.; Price, Joanna; Campbell, W. Keith

    2012-01-01

    Some scholars have called for the replacement of the Narcissistic Personality Inventory (NPI) with more narrow scales measuring grandiosity and entitlement instead. In the current study, the authors examined the relations among the NPI and measures of grandiosity and entitlement, as well as in relation to a measure of the Five-Factor Model (FFM).…

  9. Selection and integration of a network of parallel processors in the real time acquisition system of the 4{pi} DIAMANT multidetector: modeling, realization and evaluation of the software installed on this network; Choix et integration d`un reseau de processeurs paralleles dans le systeme d`acquisition temps reel du multidetecteur 4{pi} DIAMANT: modelisation, realisation et evaluation du logiciel implante sur ce reseau

    Energy Technology Data Exchange (ETDEWEB)

    Guirande, F. [Ecole Doctorale des Sciences Physiques et de l`Ingenieur, Bordeaux-1 Univ., 33 (France)

    1997-07-11

    The increase in sensitivity of 4{pi} arrays such as EUROBALL or DIAMANT has led to an increase in the data flow rate into the data acquisition system. If at the electronic level, the data flow has been distributed onto several data acquisition buses, it is necessary in the data processing system to increase the processing power. This work regards the modelling and implementation of the software allocated onto an architecture of parallel processors. Object analysis and formal methods were used, benchmark and evolution in the future of this architecture are presented. The thesis consists of two parts. Part A, devoted to `Nuclear Spectroscopy with 4 {pi} multidetectors`, contains a first chapter entitled `The Physics of 4{pi} multidetectors` and a second chapter entitled `Integral architecture of 4{pi} multidetectors`. Part B, devoted to `Parallel acquisition system of DIAMANT` contains three chapters entitled `Material architecture`, `Software architecture` and `Validation and Performances`. Four appendices and a term glossary close this work. (author) 58 refs.

  10. DFTBaby: A software package for non-adiabatic molecular dynamics simulations based on long-range corrected tight-binding TD-DFT(B)

    Science.gov (United States)

    Humeniuk, Alexander; Mitrić, Roland

    2017-12-01

    A software package, called DFTBaby, is published, which provides the electronic structure needed for running non-adiabatic molecular dynamics simulations at the level of tight-binding DFT. A long-range correction is incorporated to avoid spurious charge transfer states. Excited state energies, their analytic gradients and scalar non-adiabatic couplings are computed using tight-binding TD-DFT. These quantities are fed into a molecular dynamics code, which integrates Newton's equations of motion for the nuclei together with the electronic Schrödinger equation. Non-adiabatic effects are included by surface hopping. As an example, the program is applied to the optimization of excited states and non-adiabatic dynamics of polyfluorene. The python and Fortran source code is available at http://www.dftbaby.chemie.uni-wuerzburg.de.

  11. Safety Software Guide Perspectives for the Design of New Nuclear Facilities (U)

    International Nuclear Information System (INIS)

    VINCENT, Andrew

    2005-01-01

    In June of this year, the Department of Energy (DOE) issued directives DOE O 414.1C and DOE G 414.1-4 to improve quality assurance programs, processes, and procedures among its safety contractors. Specifically, guidance entitled, ''Safety Software Guide for use with 10 CFR 830 Subpart A, Quality Assurance Requirements, and DOE O 414.1C, Quality Assurance, DOE G 414.1-4'', provides information and acceptable methods to comply with safety software quality assurance (SQA) requirements. The guidance provides a roadmap for meeting DOE O 414.1C, ''Quality Assurance'', and the quality assurance program (QAP) requirements of Title 10 Code of Federal Regulations (CFR) 830, Subpart A, Quality Assurance, for DOE nuclear facilities and software application activities. [1, 2] The order and guide are part of a comprehensive implementation plan that addresses issues and concerns documented in Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 2002-1. [3] Safety SQA requirements for DOE as well as National Nuclear Security Administration contractors are necessary to implement effective quality assurance (QA) processes and achieve safe nuclear facility operations. DOE G 414.1-4 was developed to provide guidance on establishing and implementing effective QA processes tied specifically to nuclear facility safety software applications. The Guide includes software application practices covered by appropriate national and international consensus standards and various processes currently in use at DOE facilities. While the safety software guidance is considered to be of sufficient rigor and depth to ensure acceptable reliability of safety software at all DOE nuclear facilities, new nuclear facilities are well suited to take advantage of the guide to ensure compliant programs and processes are implemented. Attributes such as the facility life-cycle stage and the hazardous nature of each facility operations are considered, along with the category and level of importance of the

  12. Analyzing Software Errors in Safety-Critical Embedded Systems

    Science.gov (United States)

    Lutz, Robyn R.

    1994-01-01

    This paper analyzes the root causes of safty-related software faults identified as potentially hazardous to the system are distributed somewhat differently over the set of possible error causes than non-safety-related software faults.

  13. The software analysis project for the Office of Human Resources

    Science.gov (United States)

    Tureman, Robert L., Jr.

    1994-01-01

    There were two major sections of the project for the Office of Human Resources (OHR). The first section was to conduct a planning study to analyze software use with the goal of recommending software purchases and determining whether the need exists for a file server. The second section was analysis and distribution planning for retirement planning computer program entitled VISION provided by NASA Headquarters. The software planning study was developed to help OHR analyze the current administrative desktop computing environment and make decisions regarding software acquisition and implementation. There were three major areas addressed by the study: current environment new software requirements, and strategies regarding the implementation of a server in the Office. To gather data on current environment, employees were surveyed and an inventory of computers were produced. The surveys were compiled and analyzed by the ASEE fellow with interpretation help by OHR staff. New software requirements represented a compilation and analysis of the surveyed requests of OHR personnel. Finally, the information on the use of a server represents research done by the ASEE fellow and analysis of survey data to determine software requirements for a server. This included selection of a methodology to estimate the number of copies of each software program required given current use and estimated growth. The report presents the results of the computing survey, a description of the current computing environment, recommenations for changes in the computing environment, current software needs, management advantages of using a server, and management considerations in the implementation of a server. In addition, detailed specifications were presented for the hardware and software recommendations to offer a complete picture to OHR management. The retirement planning computer program available to NASA employees will aid in long-range retirement planning. The intended audience is the NASA civil

  14. Supplementation with a proprietary blend of ancient peat and apple extract may improve body composition without affecting hematology in resistance-trained men.

    Science.gov (United States)

    Joy, Jordan M; Falcone, Paul H; Vogel, Roxanne M; Mosman, Matt M; Kim, Michael P; Moon, Jordan R

    2015-11-01

    Adenosine-5'-triphosphate (ATP) is primarily known as a cellular source of energy. Increased ATP levels may have the potential to enhance body composition. A novel, proprietary blend of ancient peat and apple extracts has been reported to increase ATP levels, potentially by enhancing mitochondrial ATP production. Therefore, the purpose of this investigation was to determine the supplement's effects on body composition when consumed during 12 weeks of resistance training. Twenty-five healthy, resistance-trained, male subjects (age, 27.7 ± 4.8 years; height, 176.0 ± 6.5 cm; body mass, 83.2 ± 12.1 kg) completed this study. Subjects supplemented once daily with either 1 serving (150 mg) of a proprietary blend of ancient peat and apple extracts (TRT) or placebo (PLA). Supervised resistance training consisted of 8 weeks of daily undulating periodized training followed by a 2-week overreach and a 2-week taper phase. Body composition was assessed using dual-energy X-ray absorptiometry and ultrasound at weeks 0, 4, 8, 10, and 12. Vital signs and blood markers were assessed at weeks 0, 8, and 12. Significant group × time (p < 0.05) interactions were present for ultrasound-determined cross-sectional area, which increased in TRT (+0.91 cm(2)) versus PLA (-0.08 cm(2)), as well as muscle thickness (TRT: +0.46; PLA: +0.04 cm). A significant group × time (p < 0.05) interaction existed for creatinine (TRT: +0.06; PLA: +0.15 mg/dL), triglycerides (TRT: +24.1; PLA: -20.2 mg/dL), and very-low-density lipoprotein (TRT: +4.9; PLA: -3.9 mg/dL), which remained within clinical ranges. Supplementation with a proprietary blend of ancient peat and apple extracts may enhance resistance training-induced skeletal muscle hypertrophy without affecting fat mass or blood chemistry in healthy males.

  15. 2016 International Conference on Software Process Improvement

    CERN Document Server

    Muñoz, Mirna; Rocha, Álvaro; Feliu, Tomas; Peña, Adriana

    2017-01-01

    This book offers a selection of papers from the 2016 International Conference on Software Process Improvement (CIMPS’16), held between the 12th and 14th of October 2016 in Aguascalientes, Aguascalientes, México. The CIMPS’16 is a global forum for researchers and practitioners to present and discuss the most recent innovations, trends, results, experiences and concerns in the different aspects of software engineering with a focus on, but not limited to, software processes, security in information and communication technology, and big data. The main topics covered include: organizational models, standards and methodologies, knowledge management, software systems, applications and tools, information and communication technologies and processes in non-software domains (mining, automotive, aerospace, business, health care, manufacturing, etc.) with a clear focus on software process challenges.

  16. The effectiveness of annotated (vs. non-annotated) digital pathology slides as a teaching tool during dermatology and pathology residencies.

    Science.gov (United States)

    Marsch, Amanda F; Espiritu, Baltazar; Groth, John; Hutchens, Kelli A

    2014-06-01

    With today's technology, paraffin-embedded, hematoxylin & eosin-stained pathology slides can be scanned to generate high quality virtual slides. Using proprietary software, digital images can also be annotated with arrows, circles and boxes to highlight certain diagnostic features. Previous studies assessing digital microscopy as a teaching tool did not involve the annotation of digital images. The objective of this study was to compare the effectiveness of annotated digital pathology slides versus non-annotated digital pathology slides as a teaching tool during dermatology and pathology residencies. A study group composed of 31 dermatology and pathology residents was asked to complete an online pre-quiz consisting of 20 multiple choice style questions, each associated with a static digital pathology image. After completion, participants were given access to an online tutorial composed of digitally annotated pathology slides and subsequently asked to complete a post-quiz. A control group of 12 residents completed a non-annotated version of the tutorial. Nearly all participants in the study group improved their quiz score, with an average improvement of 17%, versus only 3% (P = 0.005) in the control group. These results support the notion that annotated digital pathology slides are superior to non-annotated slides for the purpose of resident education. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  17. Controller Placement Algorithms in Software Defined Network - A Review of Trends and Challenges

    Directory of Open Access Journals (Sweden)

    Yoon Si-Kee

    2017-01-01

    Full Text Available Traditional network architectures are complex to manage, comparatively static, rigid and difficult to make changes for new innovation. The proprietary devices in such architectures are based on manual configuration which are unwieldy and error-prone. Software Defined Network (SDN which is described as a new network paradigm that decouple the control plane from data plane are capable to solve today's network issues and improve the network performance. Nevertheless, among so many challenges and research opportunity in SDN, Controller Placement Problem (CPP is said to be the most important issues which can directly affect the overall network performance. Thus far, the issue regarding the CPP and its challenge has not been completely reviewed and discussed properly in any other papers. In this paper, we provide a comprehensive review on several optimized controller placement problem algorithms in SDN. This paper also highlights some limitations of the reviewed methods and also emphasizes on suitable approach to address the aforementioned problems.

  18. Learning Based on the Project Entitled "Design and Construction of a Wooden Bridge"

    Science.gov (United States)

    Barris, Cristina; Torres, Lluís; Simon, Enric

    2016-01-01

    This article presents the results of a case involving the application of project-based learning carried out with students in the Mechanical Engineering degree program at the University of Girona. The project, entitled "Design and construction of a wooden bridge", was conducted at the Polytechnic School in the third-year Structures…

  19. 20 CFR 725.201 - Who is entitled to benefits; contents of this subpart.

    Science.gov (United States)

    2010-04-01

    ... surviving spouse or child, or the surviving dependent brothers or sisters, where there is no surviving... part the term “total disability” shall mean partial disability with respect to a claim for which... entitlement to benefits applicable to a miner, or a surviving spouse, child, parent, brother, or sister, and...

  20. Radicais livres de oxigênio: um software introdutório Oxygen free radicals: an introductory software

    Directory of Open Access Journals (Sweden)

    Daniela K. Yokaichiya

    2000-04-01

    Full Text Available Though Free Radicals is one of the most frequently explored scientific subjects in mass communication media, the topic is absent of many Biochemistry introductory courses, especially those in which the students do not have a good chemical background. To overcome this contradictory situation we have developed a software treating this topic in a very simple way. The software is divided in four sections: (1 definition and description of free radicals, (2 production pathways, (3 mechanism of action and (4 enzymatic and non enzymatic protection. The instructional capacity of the software has been both qualitative and quantitatively evaluated through its application in undergraduate courses. The software is available in the INTERNET at the site: http://www.unicamp.br/ib/bioquimica/ensino.

  1. Prebiotic effects of non-digestible oligo- and polysaccharides

    NARCIS (Netherlands)

    Hartemink, R.

    1999-01-01

    This thesis is the result of work carried out within a four-year multi-disciplined program, entitled ' Non-digestible oligosaccharides in foods and feed'. Within the project, four Ph.D. students were employed at the Food Chemistry, Food Microbiology, Human Nutrition and Animal Nutrition

  2. SOFTWARE OPEN SOURCE, SOFTWARE GRATIS?

    Directory of Open Access Journals (Sweden)

    Nur Aini Rakhmawati

    2006-01-01

    Full Text Available Normal 0 false false false IN X-NONE X-NONE MicrosoftInternetExplorer4 Berlakunya Undang – undang Hak Atas Kekayaan Intelektual (HAKI, memunculkan suatu alternatif baru untuk menggunakan software open source. Penggunaan software open source menyebar seiring dengan isu global pada Information Communication Technology (ICT saat ini. Beberapa organisasi dan perusahaan mulai menjadikan software open source sebagai pertimbangan. Banyak konsep mengenai software open source ini. Mulai dari software yang gratis sampai software tidak berlisensi. Tidak sepenuhnya isu software open source benar, untuk itu perlu dikenalkan konsep software open source mulai dari sejarah, lisensi dan bagaimana cara memilih lisensi, serta pertimbangan dalam memilih software open source yang ada. Kata kunci :Lisensi, Open Source, HAKI

  3. Development of Radio Frequency Antenna Radiation Simulation Software

    International Nuclear Information System (INIS)

    Mohamad Idris Taib; Rozaimah Abd Rahim; Noor Ezati Shuib; Wan Saffiey Wan Abdullah

    2014-01-01

    Antennas are widely used national wide for radio frequency propagation especially for communication system. Radio frequency is electromagnetic spectrum from 10 kHz to 300 GHz and non-ionizing. These radiation exposures to human being have radiation hazard risk. This software was under development using LabVIEW for radio frequency exposure calculation. For the first phase of this development, software purposely to calculate possible maximum exposure for quick base station assessment, using prediction methods. This software also can be used for educational purpose. Some results of this software are comparing with commercial IXUS and free ware NEC software. (author)

  4. 38 CFR 3.1000 - Entitlement under 38 U.S.C. 5121 to benefits due and unpaid upon death of a beneficiary.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Entitlement under 38 U.S.C. 5121 to benefits due and unpaid upon death of a beneficiary. 3.1000 Section 3.1000 Pensions... Dependency and Indemnity Compensation Accrued § 3.1000 Entitlement under 38 U.S.C. 5121 to benefits due and...

  5. Non-destructive testing. V. 2

    International Nuclear Information System (INIS)

    Farley, J.M.; Nichols, R.W.

    1988-01-01

    The book entitled 'Non-destructive Testing' Volume 2, contains the proceedings of the fourth European Conference, organized by the British Institute of Non-Destructive Testing and held in London, September 1987. The volume contains seven chapters which examine the reliability of NDT, the economics of NDT and the use of NDT in:- civil engineering; oil, gas, coal and petrochemical industries; iron and steel industries; aerospace industry; and the nuclear and electricity supply industries. The seven chapters contain 78 papers, of which 19 are selected for INIS and indexed separately. (U.K.)

  6. The validity of using ROC software for analysing visual grading characteristics data: an investigation based on the novel software VGC analyzer

    International Nuclear Information System (INIS)

    Hansson, Jonny; Maansson, Lars Gunnar; Baath, Magnus

    2016-01-01

    The purpose of the present work was to investigate the validity of using single-reader-adapted receiver operating characteristics (ROC) software for analysis of visual grading characteristics (VGC) data. VGC data from four published VGC studies on optimisation of X-ray examinations, previously analysed using ROCFIT, were reanalysed using a recently developed software dedicated to VGC analysis (VGC Analyzer), and the outcomes [the mean and 95 % confidence interval (CI) of the area under the VGC curve (AUC VGC ) and the p-value] were compared. The studies included both paired and non-paired data and were reanalysed both for the fixed-reader and the random-reader situations. The results showed good agreement between the softwares for the mean AUC VGC . For non-paired data, wider CIs were obtained with VGC Analyzer than previously reported, whereas for paired data, the previously reported CIs were similar or even broader. Similar observations were made for the p-values. The results indicate that the use of single-reader-adapted ROC software such as ROCFIT for analysing non-paired VGC data may lead to an increased risk of committing Type I errors, especially in the random-reader situation. On the other hand, the use of ROC software for analysis of paired VGC data may lead to an increased risk of committing Type II errors, especially in the fixed-reader situation. (authors)

  7. Software in the oil industry

    International Nuclear Information System (INIS)

    Turnill, M.C.

    1982-01-01

    The paper reviews the challenges of today's oil industry which is dominated in Europe by offshore production. Some of the key computer applications are examined, discussing new software development methods which have been adopted in order to achieve significant reduction in development times. The range of modern software development tools is considered, with the decreasing impact of traditional programming languages such as COBOL and FORTRAN. The use and benefits of non procedural languages are also discussed together with some views on their relevance to high energy physics. The paper concludes with a look into the not-too-distant future, stressing the need for new approaches to software development and improving the facilities for information handling. (orig.)

  8. Position paper: cognitive radio networking for multiple sensor network interoperability in mines

    CSIR Research Space (South Africa)

    Kagize, BM

    2008-01-01

    Full Text Available . These commercially available networks are purported to be self-organizing and self correcting, though the software behind these networks are proprietary with the caveat of inter-operability difficulties with other networks [5]. There is a non-propriety and open...: Research challenges,” - Ad Hoc Networks, 2006 – Elsevier [4] V Mhatre, C Rosenberg, “Homogeneous vs heterogeneous clustered sensor networks: a comparative study,” - Communications, 2004 IEEE International Conference on, 2004 - ieeexplore.ieee.org [5...

  9. Computational Homology for Software Validation

    Science.gov (United States)

    2015-03-01

    involving compound data-types. 15. SUBJECT TERMS Abstract datatypes , convergence structure, topological methods, specification logics, hybrid software...composite datatype values are networks strewn through the device’s memory; think of a variable whose type is an array of balanced trees. Some means...structural in nature, is required to rigorously specify the evolution of composite states involving non-numerical, non-metric components. Composite datatypes

  10. Blocking carbohydrate absorption and weight loss: a clinical trial using a proprietary fractionated white bean extract.

    Science.gov (United States)

    Udani, Jay; Singh, Betsy B

    2007-01-01

    A proprietary fractionated white bean extract of Phaseolus vulgaris has been shown in vitro to inhibit the digestive enzyme alpha-amylase. This may prevent or delay the digestion of complex carbohydrates, potentially resulting in weight loss. A 4-week randomized, double-blind, placebo-controlled study of 25 healthy subjects consuming 1000 mg of a proprietary fractioned white bean extract or an identical placebo twice a day before meals in conjunction with a multi-component weight-loss program, including diet, exercise, and behavioral intervention, was conducted. Both groups reduced their weight and waist size significantly from baseline. The active group lost 6.0 lbs (P=.0002) and 2.2 in (P=.0050), and the placebo group lost 4.7 lbs (P=.0016) and 2.1 in (P=.0001). The differences between groups were not significant (weight P=.4235, waist size P=.8654). Through subsequent exploratory analysis to investigate group findings further, subjects were stratified by total dietary carbohydrate intake. This probative analysis revealed that the tertile of subjects who had consumed the most carbohydrates demonstrated significant reductions in both weight (8.7 lbs vs 1.7 lbs, P=.0412) and waist size (3.3 in vs 1.3 in P=.0100) compared with placebo subjects in the same tertile of carbohydrate intake. Subjects who adhere to a program including dietary modification, exercise, and behavioral intervention can significantly reduce their weight and waist size in a short period of time. In an exploratory analysis of data, the tertile of subjects who ate the most carbohydrates experienced a significant reduction in both weight and waist size with the addition of the white bean extract compared to the placebo group of the same tertile of carbohydrate consumption. Longer studies with a larger pool of subjects are required to validate these findings.

  11. ENCoRE: an efficient software for CRISPR screens identifies new players in extrinsic apoptosis.

    Science.gov (United States)

    Trümbach, Dietrich; Pfeiffer, Susanne; Poppe, Manuel; Scherb, Hagen; Doll, Sebastian; Wurst, Wolfgang; Schick, Joel A

    2017-11-25

    As CRISPR/Cas9 mediated screens with pooled guide libraries in somatic cells become increasingly established, an unmet need for rapid and accurate companion informatics tools has emerged. We have developed a lightweight and efficient software to easily manipulate large raw next generation sequencing datasets derived from such screens into informative relational context with graphical support. The advantages of the software entitled ENCoRE (Easy NGS-to-Gene CRISPR REsults) include a simple graphical workflow, platform independence, local and fast multithreaded processing, data pre-processing and gene mapping with custom library import. We demonstrate the capabilities of ENCoRE to interrogate results from a pooled CRISPR cellular viability screen following Tumor Necrosis Factor-alpha challenge. The results not only identified stereotypical players in extrinsic apoptotic signaling but two as yet uncharacterized members of the extrinsic apoptotic cascade, Smg7 and Ces2a. We further validated and characterized cell lines containing mutations in these genes against a panel of cell death stimuli and involvement in p53 signaling. In summary, this software enables bench scientists with sensitive data or without access to informatic cores to rapidly interpret results from large scale experiments resulting from pooled CRISPR/Cas9 library screens.

  12. 20 CFR 416.986 - Why and when we will find that you are no longer entitled to benefits based on statutory blindness.

    Science.gov (United States)

    2010-04-01

    ... longer entitled to benefits based on statutory blindness. 416.986 Section 416.986 Employees' Benefits... Disability and Blindness Blindness § 416.986 Why and when we will find that you are no longer entitled to benefits based on statutory blindness. (a) If your vision does not meet the definition of blindness. If you...

  13. Systems and software quality the next step for industrialisation

    CERN Document Server

    Wieczorek, Martin; Bons, Heinz

    2014-01-01

    Software and systems quality is playing an increasingly important role in the growth of almost all - profit and non-profit - organisations. Quality is vital to the success of enterprises in their markets. Most small trade and repair businesses use software systems in their administration and marketing processes. Every doctor's surgery is managing its patients using software. Banking is no longer conceivable without software. Aircraft, trucks and cars use more and more software to handle their increasingly complex technical systems. Innovation, competition and cost pressure are always present i

  14. Non-radioactive waste management in a Nuclear Energy Research Institution

    Energy Technology Data Exchange (ETDEWEB)

    Furusawa, Helio A.; Martins, Elaine A.J.; Cotrim, Marycel E.B.; Pires, Maria A. F., E-mail: helioaf@ipen.br, E-mail: elaine@ipen.br, E-mail: mecotrim@ipen.br, E-mail: mapires@ipen.br [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEM-SP), Sao Paulo, SP (Brazil). Centro de Quimica e Meio Ambiente

    2013-07-01

    For more than 50 years, non-radioactive materials have been used in processes at IPEN to support the nuclear fuel development and all related activities. Reagents, raw materials, products and by-products have been stored. Many of these are hazardous highly toxic or reactants materials. Some years ago actions sent part of these non-radioactive waste materials to proper disposal (technical incineration) resulting in an Institutional Non-Radioactive Waste Management Program. In 2005, an internal set of procedures and information entitled - Guia de Procedimentos para Armazenamento, Tratamento e Descarte de Residuos de Laboratorio Quimico - (Guide of Procedures for Storage, Treatment, and Disposal of Chemistry Laboratory Wastes) - was published to be used at the IPEN's facilities. A data base managed by software was created in order to allow the Units to input data and information about the routinely generated wastes and those already existing. Even after disposing so huge amount of wastes, a latent demand still exists. Several goals were achieved notably a well-organized and roomy space; safer storage places; local, state, and nationwide laws enforcement (for radioactive and non-radioactive materials); and improvement in chemicals control as hazardous and aged materials are more frequently disposed. A special stress was conducted to know and follow laws, regulations, and technical norms as the entire process is very detailed and this is not a day-by-day routine for the IPEN's technical personnel. The immediate consequence is that the safer the workplace the safer the nuclear related activities are done. (author)

  15. Non-radioactive waste management in a Nuclear Energy Research Institution

    International Nuclear Information System (INIS)

    Furusawa, Helio A.; Martins, Elaine A.J.; Cotrim, Marycel E.B.; Pires, Maria A. F.

    2013-01-01

    For more than 50 years, non-radioactive materials have been used in processes at IPEN to support the nuclear fuel development and all related activities. Reagents, raw materials, products and by-products have been stored. Many of these are hazardous highly toxic or reactants materials. Some years ago actions sent part of these non-radioactive waste materials to proper disposal (technical incineration) resulting in an Institutional Non-Radioactive Waste Management Program. In 2005, an internal set of procedures and information entitled - Guia de Procedimentos para Armazenamento, Tratamento e Descarte de Residuos de Laboratorio Quimico - (Guide of Procedures for Storage, Treatment, and Disposal of Chemistry Laboratory Wastes) - was published to be used at the IPEN's facilities. A data base managed by software was created in order to allow the Units to input data and information about the routinely generated wastes and those already existing. Even after disposing so huge amount of wastes, a latent demand still exists. Several goals were achieved notably a well-organized and roomy space; safer storage places; local, state, and nationwide laws enforcement (for radioactive and non-radioactive materials); and improvement in chemicals control as hazardous and aged materials are more frequently disposed. A special stress was conducted to know and follow laws, regulations, and technical norms as the entire process is very detailed and this is not a day-by-day routine for the IPEN's technical personnel. The immediate consequence is that the safer the workplace the safer the nuclear related activities are done. (author)

  16. Models of the atomic nucleus. With interactive software

    International Nuclear Information System (INIS)

    Cook, N.D.

    2006-01-01

    This book-and-CD-software package supplies users with an interactive experience for nuclear visualization via a computer-graphical interface, similar in principle to the molecular visualizations already available in chemistry. Models of the Atomic Nucleus, a largely non-technical introduction to nuclear theory, explains the nucleus in a way that makes nuclear physics as comprehensible as chemistry or cell biology. The book/software supplements virtually any of the current textbooks in nuclear physics by providing a means for 3D visual display of the diverse models of nuclear structure. For the first time, an easy-to-master software for scientific visualization of the nucleus makes this notoriously ''non-visual'' field become immediately 'visible.' After a review of the basics, the book explores and compares the competing models, and addresses how the lattice model best resolves remaining controversies. The appendix explains how to obtain the most from the software provided on the accompanying CD. (orig.)

  17. NHPP-Based Software Reliability Models Using Equilibrium Distribution

    Science.gov (United States)

    Xiao, Xiao; Okamura, Hiroyuki; Dohi, Tadashi

    Non-homogeneous Poisson processes (NHPPs) have gained much popularity in actual software testing phases to estimate the software reliability, the number of remaining faults in software and the software release timing. In this paper, we propose a new modeling approach for the NHPP-based software reliability models (SRMs) to describe the stochastic behavior of software fault-detection processes. The fundamental idea is to apply the equilibrium distribution to the fault-detection time distribution in NHPP-based modeling. We also develop efficient parameter estimation procedures for the proposed NHPP-based SRMs. Through numerical experiments, it can be concluded that the proposed NHPP-based SRMs outperform the existing ones in many data sets from the perspective of goodness-of-fit and prediction performance.

  18. Can we make a new deal? Entitlement reform sounds alluring, but the reality is stark.

    Science.gov (United States)

    Wagner, L

    1995-01-20

    After simmering for more than a decade, the Great Entitlement Debate promises to dominate the 1995 congressional agenda. But lost amid a tangle of conflicting parochial interests, voter confusion and searing partisan rhetoric are some harsh truths about our options.

  19. Perceived entitlement causes discrimination against attractive job candidates in the domain of relatively less desirable jobs.

    Science.gov (United States)

    Lee, Margaret; Pitesa, Marko; Pillutla, Madan M; Thau, Stefan

    2018-03-01

    People generally hold positive stereotypes of physically attractive people and because of those stereotypes often treat them more favorably. However, we propose that some beliefs about attractive people, specifically, the perception that attractive individuals have a greater sense of entitlement than less attractive individuals, can result in negative treatment of attractive people. We examine this in the context of job selection and propose that for relatively less desirable jobs, attractive candidates will be discriminated against. We argue that the ascribed sense of entitlement to good outcomes leads to perceptions that attractive individuals are more likely to be dissatisfied working in relatively less desirable jobs. When selecting candidates for relatively less desirable jobs, decision makers try to ascertain whether a candidate would be satisfied in those jobs, and the stereotype of attractive individuals feeling entitled to good outcomes makes decision makers judge attractive candidates as more likely to be dissatisfied in relatively less (but not more) desirable jobs. Consequently, attractive candidates are discriminated against in the selection for relatively less desirable jobs. Four experiments found support for this theory. Our results suggest that different discriminatory processes operate when decision makers select among candidates for relatively less desirable jobs and that attractive people might be systematically discriminated against in a segment of the workforce. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  20. Software Prefetching for Indirect Memory Accesses

    OpenAIRE

    Ainsworth, Sam; Jones, Timothy

    2017-01-01

    Many modern data processing and HPC workloads are heavily memory-latency bound. A tempting proposition to solve this is software prefetching, where special non-blocking loads are used to bring data into the cache hierarchy just before being required. However, these are difficult to insert to effectively improve performance, and techniques for automatic insertion are currently limited. This paper develops a novel compiler pass to automatically generate software prefetches for indirect mem...

  1. Software Dependability and Safety Evaluations ESA's Initiative

    Science.gov (United States)

    Hernek, M.

    ESA has allocated funds for an initiative to evaluate Dependability and Safety methods of Software. The objectives of this initiative are; · More extensive validation of Safety and Dependability techniques for Software · Provide valuable results to improve the quality of the Software thus promoting the application of Dependability and Safety methods and techniques. ESA space systems are being developed according to defined PA requirement specifications. These requirements may be implemented through various design concepts, e.g. redundancy, diversity etc. varying from project to project. Analysis methods (FMECA. FTA, HA, etc) are frequently used during requirements analysis and design activities to assure the correct implementation of system PA requirements. The criticality level of failures, functions and systems is determined and by doing that the critical sub-systems are identified, on which dependability and safety techniques are to be applied during development. Proper performance of the software development requires the development of a technical specification for the products at the beginning of the life cycle. Such technical specification comprises both functional and non-functional requirements. These non-functional requirements address characteristics of the product such as quality, dependability, safety and maintainability. Software in space systems is more and more used in critical functions. Also the trend towards more frequent use of COTS and reusable components pose new difficulties in terms of assuring reliable and safe systems. Because of this, its dependability and safety must be carefully analysed. ESA identified and documented techniques, methods and procedures to ensure that software dependability and safety requirements are specified and taken into account during the design and development of a software system and to verify/validate that the implemented software systems comply with these requirements [R1].

  2. CytoBayesJ: software tools for Bayesian analysis of cytogenetic radiation dosimetry data.

    Science.gov (United States)

    Ainsbury, Elizabeth A; Vinnikov, Volodymyr; Puig, Pedro; Maznyk, Nataliya; Rothkamm, Kai; Lloyd, David C

    2013-08-30

    A number of authors have suggested that a Bayesian approach may be most appropriate for analysis of cytogenetic radiation dosimetry data. In the Bayesian framework, probability of an event is described in terms of previous expectations and uncertainty. Previously existing, or prior, information is used in combination with experimental results to infer probabilities or the likelihood that a hypothesis is true. It has been shown that the Bayesian approach increases both the accuracy and quality assurance of radiation dose estimates. New software entitled CytoBayesJ has been developed with the aim of bringing Bayesian analysis to cytogenetic biodosimetry laboratory practice. CytoBayesJ takes a number of Bayesian or 'Bayesian like' methods that have been proposed in the literature and presents them to the user in the form of simple user-friendly tools, including testing for the most appropriate model for distribution of chromosome aberrations and calculations of posterior probability distributions. The individual tools are described in detail and relevant examples of the use of the methods and the corresponding CytoBayesJ software tools are given. In this way, the suitability of the Bayesian approach to biological radiation dosimetry is highlighted and its wider application encouraged by providing a user-friendly software interface and manual in English and Russian. Copyright © 2013 Elsevier B.V. All rights reserved.

  3. Software ``Best'' Practices: Agile Deconstructed

    Science.gov (United States)

    Fraser, Steven

    Software “best” practices depend entirely on context - in terms of the problem domain, the system constructed, the software designers, and the “customers” ultimately deriving value from the system. Agile practices no longer have the luxury of “choosing” small non-mission critical projects with co-located teams. Project stakeholders are selecting and adapting practices based on a combina tion of interest, need and staffing. For example, growing product portfolios through a merger or the acquisition of a company exposes legacy systems to new staff, new software integration challenges, and new ideas. Innovation in communications (tools and processes) to span the growth and contraction of both information and organizations, while managing the adoption of changing software practices, is imperative for success. Traditional web-based tools such as web pages, document libraries, and forums are not suf ficient. A blend of tweeting, blogs, wikis, instant messaging, web-based confer encing, and telepresence creates a new dimension of communication “best” practices.

  4. ORNL's DCAL software package

    International Nuclear Information System (INIS)

    Eckerman, K.F.

    2007-01-01

    Oak Ridge National Laboratory has released its Dose and Risk Calculation software, DCAL. DCAL, developed with the support of the U.S. Environmental Protection Agency, consists of a series of computational modules, driven in either an interactive or a batch mode for computation of dose and risk coefficients from intakes of radionuclides or exposure to radionuclides in environmental media. The software package includes extensive libraries of biokinetic and dosimetric data that represent the current state of the art. The software has unique capability for addressing intakes of radionuclides by non-adults. DCAL runs as 32-bit extended DOS and console applications under Windows 98/NT/2000/XP. It is intended for users familiar with the basic elements of computational radiation dosimetry. Components of DCAL have been used to prepare U.S. Environmental Protection Agency's Federal Guidance Reports 12 and 13 and several publications of the International Commission on Radiological Protection. (author)

  5. X-ray scattering studies of non-equilibrium ordering processes

    International Nuclear Information System (INIS)

    Nagler, S.E.

    1990-01-01

    We report on the progress of our project entitled ''X-ray Scattering of Non-Equilibrium Ordering Processes.'' During the past year we have made the first synchrotron measurements of ordering in Cu 3 Au have revealed the presence of an intermediate, non-equilibrium ordered state. Preliminary work involving x-ray magnetic scattering has been carried out. Work is continuing in these areas as well as on related problems. 5 refs

  6. 76 FR 30366 - Draft Alert Entitled “Preventing Occupational Respiratory Disease From Dampness in Office...

    Science.gov (United States)

    2011-05-25

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention [Docket Number NIOSH-238] Draft Alert Entitled ``Preventing Occupational Respiratory Disease From Dampness in Office... Institute for Occupational Safety and Health, Centers for Disease Control and Prevention. [FR Doc. 2011...

  7. International comparison of systems to determine entitlements to medical specialist care: performance and organizational issues

    NARCIS (Netherlands)

    E.A. Stolk (Elly); A.A. de Bont (Antoinette); M.J. Poley (Marten); S. Jerak (Sonja); M. Stroet (Mary); F.F.H. Rutten (Frans)

    2008-01-01

    textabstractSummary Objective: CVZ has asked us to provide a comparison of criteria and procedures that different countries use to determine entitlements to medical specialist care. This question was asked within the context of the recent introduction of the DBC (diagnosis treatment combinations)

  8. 20 CFR 404.467 - Nonpayment of benefits; individual entitled to disability insurance benefits or childhood...

    Science.gov (United States)

    2010-04-01

    ... type of substantial gainful activity. (b) Childhood disability benefits. An individual who has attained... Nonpayments of Benefits § 404.467 Nonpayment of benefits; individual entitled to disability insurance benefits... definition of disability for disability insurance benefits purposes based on statutory blindness, as defined...

  9. Using Rose and Compass for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2009-07-09

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

  10. Using Rose and Compass for Authentication

    International Nuclear Information System (INIS)

    White, G.

    2009-01-01

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work

  11. 4th International Conference on Software Process Improvement

    CERN Document Server

    Muñoz, Mirna; Rocha, Álvaro; Calvo-Manzano, Jose

    2016-01-01

    This book contains a selection of papers from The 2015 International Conference on Software Process Improvement (CIMPS’15), held between the 28th and 30th of October in Mazatlán, Sinaloa, México. The CIMPS’15 is a global forum for researchers and practitioners that present and discuss the most recent innovations, trends, results, experiences and concerns in the several perspectives of Software Engineering with clear relationship but not limited to software processes, Security in Information and Communication Technology and Big Data Field. The main topics covered are: Organizational Models, Standards and Methodologies, Knowledge Management, Software Systems, Applications and Tools, Information and Communication Technologies and Processes in non-software domains (Mining, automotive, aerospace, business, health care, manufacturing, etc.) with a demonstrated relationship to software process challenges.

  12. A Model for Quality Optimization in Software Design Processes

    NARCIS (Netherlands)

    Noppen, J.A.R.; van den Broek, P.M.; Aksit, Mehmet

    The main objective of software engineers is to design and implement systems that implement all functional and non-functional requirements. Unfortunately, it is very difficult or even generally impossible to deliver a software system that satisfies all the requirements. Even more seriously, failures

  13. Developing open-source codes for electromagnetic geophysics using industry support

    Science.gov (United States)

    Key, K.

    2017-12-01

    Funding for open-source software development in academia often takes the form of grants and fellowships awarded by government bodies and foundations where there is no conflict-of-interest between the funding entity and the free dissemination of the open-source software products. Conversely, funding for open-source projects in the geophysics industry presents challenges to conventional business models where proprietary licensing offers value that is not present in open-source software. Such proprietary constraints make it easier to convince companies to fund academic software development under exclusive software distribution agreements. A major challenge for obtaining commercial funding for open-source projects is to offer a value proposition that overcomes the criticism that such funding is a give-away to the competition. This work draws upon a decade of experience developing open-source electromagnetic geophysics software for the oil, gas and minerals exploration industry, and examines various approaches that have been effective for sustaining industry sponsorship.

  14. Analyzing Software Requirements Errors in Safety-Critical, Embedded Systems

    Science.gov (United States)

    Lutz, Robyn R.

    1993-01-01

    This paper analyzes the root causes of safety-related software errors in safety-critical, embedded systems. The results show that software errors identified as potentially hazardous to the system tend to be produced by different error mechanisms than non- safety-related software errors. Safety-related software errors are shown to arise most commonly from (1) discrepancies between the documented requirements specifications and the requirements needed for correct functioning of the system and (2) misunderstandings of the software's interface with the rest of the system. The paper uses these results to identify methods by which requirements errors can be prevented. The goal is to reduce safety-related software errors and to enhance the safety of complex, embedded systems.

  15. Business engineering. Generic Software Architecture in an Object Oriented View

    Directory of Open Access Journals (Sweden)

    Mihaela MURESAN

    2006-01-01

    Full Text Available The generic software architecture offers a solution for the the information system's development and implementation. A generic software/non-software model could be developed by integrating the enterprise blueprint concept (Zachman and the object oriented paradigm (Coad's archetype concept. The standardization of the generic software architecture for various specific software components could be a direction of crucial importance, offering the guarantee of the quality of the model and increasing the efficiency of the design, development and implementation of the software. This approach is also useful for the implementation of the ERP systems designed to fit the user’s particular requirements.

  16. Entitlement to vote in the Cantons of Geneva and Vaud and eligibility for election in the Canton of Vaud

    CERN Multimedia

    2006-01-01

    The Permanent Mission of Switzerland has informed CERN that some international civil servants and members of their families are henceforth entitled to vote on commune matters in the Canton of Geneva and are entitled to vote and are eligible for election at commune level in the Canton of Vaud. For further information, in particular regarding the special procedure to be followed to apply to exercise this entitlement, you are invited to consult the information published, in French only, on the Swiss Mission's website: http://www.dfae.admin.ch/eda/fr/home/topics/intorg/un/unge/gepri/manvot/manvt1.html (for the Canton of Geneva), http://www.eda.admin.ch/eda/fr/home/topics/intorg/un/unge/gepri/manvot/manvt2.html (for the Canton of Vaud), In this regard, you are reminded that: Under Articles I 3.05 and I 3.07 of the Staff Rules, a member of the personnel 'may take part, outside the Organization, in the public and political life of a State in accordance with the relevant legislation' and 'express his own person...

  17. Web-based communication tools in a European research project: the example of the TRACE project

    Directory of Open Access Journals (Sweden)

    Baeten V.

    2009-01-01

    Full Text Available The multi-disciplinary and international nature of large European projects requires powerful managerial and communicative tools to ensure the transmission of information to the end-users. One such project is TRACE entitled “Tracing Food Commodities in Europe”. One of its objectives is to provide a communication system dedicated to be the central source of information on food authenticity and traceability in Europe. This paper explores the web tools used and communication vehicles offered to scientists involved in the TRACE project to communicate internally as well as to the public. Two main tools have been built: an Intranet and a public website. The TRACE website can be accessed at http://www.trace.eu.org. A particular emphasis was placed on the efficiency, the relevance and the accessibility of the information, the publicity of the website as well as the use of the collaborative utilities. The rationale of web space design as well as integration of proprietary software solutions are presented. Perspectives on the using of web tools in the research projects are discussed.

  18. An exploratory study of relative and incremental information content of two non-financial performance measures: Field study evidence on absence frequency and on-time delivery

    NARCIS (Netherlands)

    Wiersma, E.

    2008-01-01

    In this exploratory field study, I test the relative and incremental information content of two non-financial performance measures compared to financial performance measures for future financial performance. The proprietary database used is from the contracts of the managers of 27 responsibility

  19. Overview Report: Normal and Emergency Operation Visualization

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, Frank L.

    2011-05-01

    This is an overview report to document and illustrate methods used in a project entitled “Normal and Emergency Operations Visualization” for a utility company, conducted in 2009-2010 timeframe with funding from the utility company and the U.S. Department of Energy. The original final report (about 180 pages) for the project is not available for distribution because it alludes to findings that assessed the design of an operational system that contained proprietary information; this abridged version contains descriptions of methods and some findings to illustrate the approach used, while avoiding discussion of sensitive or proprietary information. The client has approved this abridged version of the report for unlimited distribution to give researchers and collaborators the benefit of reviewing the research concepts and methods that were applied in this study.

  20. Global Software Engineering: A Software Process Approach

    Science.gov (United States)

    Richardson, Ita; Casey, Valentine; Burton, John; McCaffery, Fergal

    Our research has shown that many companies are struggling with the successful implementation of global software engineering, due to temporal, cultural and geographical distance, which causes a range of factors to come into play. For example, cultural, project managementproject management and communication difficulties continually cause problems for software engineers and project managers. While the implementation of efficient software processes can be used to improve the quality of the software product, published software process models do not cater explicitly for the recent growth in global software engineering. Our thesis is that global software engineering factors should be included in software process models to ensure their continued usefulness in global organisations. Based on extensive global software engineering research, we have developed a software process, Global Teaming, which includes specific practices and sub-practices. The purpose is to ensure that requirements for successful global software engineering are stipulated so that organisations can ensure successful implementation of global software engineering.

  1. Developmental Trajectories of Work Values and Job Entitlement Beliefs in the Transition to Adulthood

    Science.gov (United States)

    Chow, Angela; Krahn, Harvey J.; Galambos, Nancy L.

    2014-01-01

    Employing a life span developmental systems perspective, this study used a 5-wave (1985-1992) Canadian longitudinal data set (N = 404) to examine trajectories of intrinsic and extrinsic work values and job entitlement beliefs from age 18 to 25. Piecewise growth models (Slope 1: age 18-20; Slope 2: age 20-25) showed intriguing patterns of change.…

  2. McXtrace

    DEFF Research Database (Denmark)

    Bergbäck Knudsen, Erik; Prodi, Andrea; Baltser, Jana

    2013-01-01

    to the standard X-ray simulation software SHADOW. McXtrace is open source, licensed under the General Public License, and does not require the user to have access to any proprietary software for its operation. The structure of the software is described in detail, and various examples are given to showcase...

  3. 20 CFR 222.53 - When a legally adopted child is dependent-child adopted after entitlement.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false When a legally adopted child is dependent-child adopted after entitlement. 222.53 Section 222.53 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT FAMILY RELATIONSHIPS Child Support and Dependency § 222.53 When...

  4. Proprietary arabinogalactan extract increases antibody response to the pneumonia vaccine: a randomized, double-blind, placebo-controlled, pilot study in healthy volunteers

    Directory of Open Access Journals (Sweden)

    Udani Jay K

    2010-08-01

    Full Text Available Abstract Background Arabinogalactan from Larch tree (Larix spp. bark has previously demonstrated immunostimulatory activity. The purpose of this study was to test the hypothesis that ingestion of a proprietary arabinogalactan extract, ResistAid™, would selectively enhance the antibody response to the pneumococcal (pneumonia vaccine in healthy adults. Methods This randomized, double-blind, placebo-controlled, parallel group pilot study included 45 healthy adults who had not previously been vaccinated against Streptococcus pneumoniae. The volunteers began taking the study product or placebo (daily dosage 4.5 g at the screening visit (V1-Day 0 and continued over the entire 72 day study period. After 30 days the subjects received the 23-valent pneumococcal vaccine (V2. They were monitored the following day (V3-Day 31, as well as 21 days (V4-Day 51 and 42 days (V5-Day 72 after vaccination. Responses by the adaptive immune system (antigen specific were measured via pneumococcal IgG antibodies (subtypes 4, 6B, 9V, 14, 18C, 19F, and 23F and salivary IgA levels. Responses by the innate immune system (non-specific were measured via white blood cell counts, inflammatory cytokines and the complement system. Results Vaccination significantly increased pneumococcal IgG levels as expected. The arabinogalactan group demonstrated a statistically significant greater IgG antibody response than the placebo group in two antibodies subtypes (18C and 23F at both Day 51 (p = 0.006 and p = 0.002 and at Day 72 (p = 0.008 and p = 0.041. These same subtypes (18C and 23F also demonstrated change scores from baseline which were significant, in favor of the arabinogalactan group, at Day 51 (p = 0.033 and 0.001 and at Day 72 (p = 0.012 and p = 0.003. Change scores from baseline and mean values were greater in the arabinogalactan group than placebo for most time points in antibody subtypes 4, 6B, 9V, and 19F, but these differences did not reach statistical significance. There

  5. Proprietary arabinogalactan extract increases antibody response to the pneumonia vaccine: a randomized, double-blind, placebo-controlled, pilot study in healthy volunteers.

    Science.gov (United States)

    Udani, Jay K; Singh, Betsy B; Barrett, Marilyn L; Singh, Vijay J

    2010-08-26

    Arabinogalactan from Larch tree (Larix spp.) bark has previously demonstrated immunostimulatory activity. The purpose of this study was to test the hypothesis that ingestion of a proprietary arabinogalactan extract, ResistAid™, would selectively enhance the antibody response to the pneumococcal (pneumonia) vaccine in healthy adults. This randomized, double-blind, placebo-controlled, parallel group pilot study included 45 healthy adults who had not previously been vaccinated against Streptococcus pneumoniae. The volunteers began taking the study product or placebo (daily dosage 4.5 g) at the screening visit (V1-Day 0) and continued over the entire 72 day study period. After 30 days the subjects received the 23-valent pneumococcal vaccine (V2). They were monitored the following day (V3-Day 31), as well as 21 days (V4-Day 51) and 42 days (V5-Day 72) after vaccination. Responses by the adaptive immune system (antigen specific) were measured via pneumococcal IgG antibodies (subtypes 4, 6B, 9V, 14, 18C, 19F, and 23F) and salivary IgA levels. Responses by the innate immune system (non-specific) were measured via white blood cell counts, inflammatory cytokines and the complement system. Vaccination significantly increased pneumococcal IgG levels as expected. The arabinogalactan group demonstrated a statistically significant greater IgG antibody response than the placebo group in two antibodies subtypes (18C and 23F) at both Day 51 (p = 0.006 and p = 0.002) and at Day 72 (p = 0.008 and p = 0.041). These same subtypes (18C and 23F) also demonstrated change scores from baseline which were significant, in favor of the arabinogalactan group, at Day 51 (p = 0.033 and 0.001) and at Day 72 (p = 0.012 and p = 0.003). Change scores from baseline and mean values were greater in the arabinogalactan group than placebo for most time points in antibody subtypes 4, 6B, 9V, and 19F, but these differences did not reach statistical significance. There was no effect from the vaccine or

  6. Copyright and personal use of CERN’s computing infrastructure

    CERN Multimedia

    IT Department

    2009-01-01

    (La version française sera en ligne prochainement)The rules covering the personal use of CERN’s computing infrastructure are defined in Operational Circular No. 5 and its Subsidiary Rules (see http://cern.ch/ComputingRules). All users of CERN’s computing infrastructure must comply with these rules, whether they access CERN’s computing facilities from within the Organization’s site or at another location. In particular, OC5 clause 17 requires that proprietary rights (the rights in software, music, video, etc.) must be respected. The user is liable for damages resulting from non-compliance. Recently, there have been several violations of OC5, where copyright material was discovered on public world-readable disk space. Please ensure that all material under your responsibility (in particular in files owned by your account) respects proprietary rights, including with respect to the restriction of access by third parties. CERN Security Team

  7. Integrated Software Development System/Higher Order Software Conceptual Description (ISDS/HOS)

    Science.gov (United States)

    1976-11-01

    Structured Flowchart Conventions 270 6.3.5.3 Design Diagram Notation 273 xii HIGHER ORDER SOFTWARE, INC. 843 MASSACHUSETTS AVENUE. CAMBRIDGE, MASSACHUSETTS...associated with the process steps. They also reference other HIPO diagrams as well an non-HIPO documentation such as flowcharts or decision tables of...syntax that is easy to learn and must provide the novice with some prompting to help him avoid classic beginner errors. Desirable editing capabilities

  8. Software engineering architecture-driven software development

    CERN Document Server

    Schmidt, Richard F

    2013-01-01

    Software Engineering: Architecture-driven Software Development is the first comprehensive guide to the underlying skills embodied in the IEEE's Software Engineering Body of Knowledge (SWEBOK) standard. Standards expert Richard Schmidt explains the traditional software engineering practices recognized for developing projects for government or corporate systems. Software engineering education often lacks standardization, with many institutions focusing on implementation rather than design as it impacts product architecture. Many graduates join the workforce with incomplete skil

  9. Comparative assessment of software for non-targeted data analysis in the study of volatile fingerprint changes during storage of a strawberry beverage.

    Science.gov (United States)

    Morales, M L; Callejón, R M; Ordóñez, J L; Troncoso, A M; García-Parrilla, M C

    2017-11-03

    Five free software packages were compared to assess their utility for the non-targeted study of changes in the volatile profile during the storage of a novel strawberry beverage. AMDIS coupled to Gavin software turned out to be easy to use, required the minimum handling for subsequent data treatment and its results were the most similar to those obtained by manual integration. However, AMDIS coupled to SpectConnect software provided more information for the study of volatile profile changes during the storage of strawberry beverage. During storage, volatile profile changed producing the differentiation among the strawberry beverage stored at different temperatures, and this difference increases as time passes; these results were also supported by PCA. As expected, it seems that cold temperature is the best way of preservation for this product during long time storage. Variable Importance in the Projection (VIP) and correlation scores pointed out four volatile compounds as potential markers for shelf-life of our strawberry beverage: 2-phenylethyl acetate, decanoic acid, γ-decalactone and furfural. Copyright © 2017 Elsevier B.V. All rights reserved.

  10. The Impact of Active Labor Market Programs and Benefit Entitlement Rules on the Duration of Unemployment

    NARCIS (Netherlands)

    Lalive, R.; van Ours, J.C.; Zweimüller, J.

    2000-01-01

    Swiss policy makers created a unique link between unemployment benefits and active labor market programs (ALMPs) by making benefit payments conditional on program attendance after 7 months of unemployment duration. We evaluate the effect of ALMPs and benefit entitlement on the duration of

  11. Economic Entitlements via Entrepreneurial Conduct? Women and Financial Inclusion in Neo-liberal India

    Directory of Open Access Journals (Sweden)

    K. Kalpana

    2015-08-01

    Full Text Available This paper examines the gendered local character of neoliberalism at the household level by focusing on microcredit/finance programs in India. Microfinance promoted by the state as an informal activity targeting women is intended to alleviate income inequalities, even as it contributes to maintaining the world capitalist system. In India the inception of microfinance-based Self Help Groups (SHGs or peer groups of women savers and borrowers in the 1990s has coincided with a rightward turn towards neoliberal policies of structural adjustment, privatization and economic deregulation. In this paper, I show how Indian policy makers have endeavored to make women's economic entitlements contingent upon their disciplined financial behavior and their willing participation in neoliberal agendas of creating and deepening 'self-regulating' markets at village levels. Drawing on an ethnographic study conducted in a South Indian state, I show that the community level 'neoliberal disciplining' that microfinance entails does not proceed without resistance. Whilst SHGs seek to constitute women as fiscally disciplined savers and borrowers, women stake their 'rightful' entitlement to bank credit even as they reject outright the entrepreneurial subjectivities they are expected to assume. They pursue purposes and ends that extend well beyond 'financial inclusion.'

  12. Evaluation of the free, open source software WordPress as electronic portfolio system in undergraduate medical education.

    Science.gov (United States)

    Avila, Javier; Sostmann, Kai; Breckwoldt, Jan; Peters, Harm

    2016-06-03

    capabilities with the free and open source software WordPress. This allows institutions without proprietary software to build a sophisticated ePortfolio system adapted to their needs with relatively few resources. The implementation of WordPress should be accompanied by introductory courses in the use of the software and its apps in order to facilitate its usability.

  13. Parameter definition using vibration prediction software leads to significant drilling performance improvements

    Energy Technology Data Exchange (ETDEWEB)

    Amorim, Dalmo; Hanley, Chris Hanley; Fonseca, Isaac; Santos, Juliana [National Oilwell Varco, Houston TX (United States); Leite, Daltro J.; Borella, Augusto; Gozzi, Danilo [Petroleo Brasileiro S.A. (PETROBRAS), Rio de Janeiro, RJ (Brazil)

    2012-07-01

    field monitoring. Vibration prediction diminishes the importance of trial-and-error procedures such as drill-off tests, which are valid only for short sections. It also solves an existing lapse in Mechanical Specific Energy (MSE) real-time drilling control programs applying the theory of Teale, which states that a drilling system is perfectly efficient when it spends the exact energy to overcome the in situ rock strength. Using the proprietary software tool this paper will examine the resonant vibration modes that may be initiated while drilling with different BHA's and drill string designs, showing that the combination of a proper BHA design along with the correct selection of input parameters results in an overall improvement to drilling efficiency. Also, being the BHA predictively analyzed, it will be reduced the potential for vibration or stress fatigue in the drill string components, leading to a safer operation. In the recent years there has been an increased focus on vibration detection, analysis, and mitigation techniques, where new technologies, like the Drilling Dynamics Data Recorders (DDDR), may provide the capability to capture high frequency dynamics data at multiple points along the drilling system. These tools allow the achievement of drilling performance improvements not possible before, opening a whole new array of opportunities for optimization and for verification of predictions calculated by the drill string dynamics modeling software tool. The results of this study will identify how the dynamics from the drilling system, interacting with formation, directly relate to inefficiencies and to the possible solutions to mitigate drilling vibrations in order to improve drilling performance. Software vibration prediction and downhole measurements can be used for non-drilling operations like drilling out casing or reaming, where extremely high vibration levels - devastating to the cutting structure of the bit before it has even touched bottom - have

  14. Software FMEA analysis for safety-related application software

    International Nuclear Information System (INIS)

    Park, Gee-Yong; Kim, Dong Hoon; Lee, Dong Young

    2014-01-01

    Highlights: • We develop a modified FMEA analysis suited for applying to software architecture. • A template for failure modes on a specific software language is established. • A detailed-level software FMEA analysis on nuclear safety software is presented. - Abstract: A method of a software safety analysis is described in this paper for safety-related application software. The target software system is a software code installed at an Automatic Test and Interface Processor (ATIP) in a digital reactor protection system (DRPS). For the ATIP software safety analysis, at first, an overall safety or hazard analysis is performed over the software architecture and modules, and then a detailed safety analysis based on the software FMEA (Failure Modes and Effect Analysis) method is applied to the ATIP program. For an efficient analysis, the software FMEA analysis is carried out based on the so-called failure-mode template extracted from the function blocks used in the function block diagram (FBD) for the ATIP software. The software safety analysis by the software FMEA analysis, being applied to the ATIP software code, which has been integrated and passed through a very rigorous system test procedure, is proven to be able to provide very valuable results (i.e., software defects) that could not be identified during various system tests

  15. Using Combined SFTA and SFMECA Techniques for Space Critical Software

    Science.gov (United States)

    Nicodemos, F. G.; Lahoz, C. H. N.; Abdala, M. A. D.; Saotome, O.

    2012-01-01

    This work addresses the combined Software Fault Tree Analysis (SFTA) and Software Failure Modes, Effects and Criticality Analysis (SFMECA) techniques applied to space critical software of satellite launch vehicles. The combined approach is under research as part of the Verification and Validation (V&V) efforts to increase software dependability and as future application in other projects under development at Instituto de Aeronáutica e Espaço (IAE). The applicability of such approach was conducted on system software specification and applied to a case study based on the Brazilian Satellite Launcher (VLS). The main goal is to identify possible failure causes and obtain compensating provisions that lead to inclusion of new functional and non-functional system software requirements.

  16. Hyperspectral Soil Mapper (HYSOMA) software interface: Review and future plans

    Science.gov (United States)

    Chabrillat, Sabine; Guillaso, Stephane; Eisele, Andreas; Rogass, Christian

    2014-05-01

    With the upcoming launch of the next generation of hyperspectral satellites that will routinely deliver high spectral resolution images for the entire globe (e.g. EnMAP, HISUI, HyspIRI, HypXIM, PRISMA), an increasing demand for the availability/accessibility of hyperspectral soil products is coming from the geoscience community. Indeed, many robust methods for the prediction of soil properties based on imaging spectroscopy already exist and have been successfully used for a wide range of soil mapping airborne applications. Nevertheless, these methods require expert know-how and fine-tuning, which makes them used sparingly. More developments are needed toward easy-to-access soil toolboxes as a major step toward the operational use of hyperspectral soil products for Earth's surface processes monitoring and modelling, to allow non-experienced users to obtain new information based on non-expensive software packages where repeatability of the results is an important prerequisite. In this frame, based on the EU-FP7 EUFAR (European Facility for Airborne Research) project and EnMAP satellite science program, higher performing soil algorithms were developed at the GFZ German Research Center for Geosciences as demonstrators for end-to-end processing chains with harmonized quality measures. The algorithms were built-in into the HYSOMA (Hyperspectral SOil MApper) software interface, providing an experimental platform for soil mapping applications of hyperspectral imagery that gives the choice of multiple algorithms for each soil parameter. The software interface focuses on fully automatic generation of semi-quantitative soil maps such as soil moisture, soil organic matter, iron oxide, clay content, and carbonate content. Additionally, a field calibration option calculates fully quantitative soil maps provided ground truth soil data are available. Implemented soil algorithms have been tested and validated using extensive in-situ ground truth data sets. The source of the HYSOMA

  17. Proceedings of the workshop on 'effect of radiation on non-human biota'

    International Nuclear Information System (INIS)

    Takahashi, Sentaro; Takahashi, Tomoyuki

    2011-03-01

    Safety assessment and protection for the radiation exposure were so far mainly based on the radiation effects on human health, because it has been generally recognized that, when human beings are protected, other environmental life, at least in the level of species or groups, will be protected from the radiation hazards, even if individuals may be affected. Recently, with increasing concern on environmental protection, a new framework of radiation protection has been proposed, where non-human biota as well as human beings is included. Researches on the environmental radiation protection need a contribution of multi-disciplinary researchers as similar to the other environmental sciences. Especially, a research field on the biological effect of radiation on non-human biota is fundamental and essential. Therefore, we planned the Workshop entitled Effect of Radiation on the Non-human Biota this time. All the 13 papers presented at the entitled meeting are indexed individually. (J.P.N.)

  18. IMIS desktop & smartphone software solutions for monitoring spacecrafts' payload from anywhere

    Science.gov (United States)

    Baroukh, J.; Queyrut, O.; Airaud, J.

    In the past years, the demand for satellite remote operations has increased guided by on one hand, the will to reduce operations cost (on-call operators out of business hours), and on the other hand, the development of cooperation space missions resulting in a world wide distribution of engineers and science team members. Only a few off-the-shelf solutions exist to fulfill the need of remote payload monitoring, and they mainly use proprietary devices. The recent advent of mobile technologies (laptops, smartphones and tablets) as well as the worldwide deployment of broadband networks (3G, Wi-Fi hotspots), has opened up a technical window that brings new options. As part of the Mars Science Laboratory (MSL) mission, the Centre National D'Etudes Spatiales (CNES, the French space agency) has developed a new software solution for monitoring spacecraft payloads. The Instrument Monitoring Interactive Software (IMIS) offers state-of-the-art operational features for payload monitoring, and can be accessed remotely. It was conceived as a generic tool that can be used for heterogeneous payloads and missions. IMIS was designed as a classical client/server architecture. The server is hosted at CNES and acts as a data provider while two different kinds of clients are available depending on the level of mobility required. The first one is a rich client application, built on Eclipse framework, which can be installed on usual operating systems and communicates with the server through the Internet. The second one is a smartphone application for any Android platform, connected to the server thanks to the mobile broadband network or a Wi-Fi connection. This second client is mainly devoted to on-call operations and thus only contains a subset of the IMIS functionalities. This paper describes the operational context, including security aspects, that led IMIS development, presents the selected software architecture and details the various features of both clients: the desktop and the sm

  19. Human Rights as Practice: Dalit Women's Collective Action to Secure Livelihood Entitlements in rural South India

    NARCIS (Netherlands)

    Mangubhai, Y.

    2012-01-01

    In this dissertation, I investigate how Dalit women in rural South India secure livelihood entitlements by analysing processes of social exclusion as well as collective action by these women through their perspectives. This problematic requires focus on how caste, class and gender mutually construct

  20. Develop improved battery charger (Turbo-Z Battery Charging System). Final report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-09-01

    The output of this project was a flexible control board. The control board can be used to control a variety of rapid battery chargers. The control module will reduce development cost of rapid battery charging hardware. In addition, PEPCO's proprietary battery charging software have been pre-programmed into the control microprocessor. This product is being applied to the proprietary capacitive charging system now under development.

  1. Continuous Software Quality analysis for the ATLAS experiment

    CERN Document Server

    Washbrook, Andrew; The ATLAS collaboration

    2017-01-01

    The regular application of software quality tools in large collaborative projects is required to reduce code defects to an acceptable level. If left unchecked the accumulation of defects invariably results in performance degradation at scale and problems with the long-term maintainability of the code. Although software quality tools are effective for identification there remains a non-trivial sociological challenge to resolve defects in a timely manner. This is a ongoing concern for the ATLAS software which has evolved over many years to meet the demands of Monte Carlo simulation, detector reconstruction and data analysis. At present over 3.8 million lines of C++ code (and close to 6 million total lines of code) are maintained by a community of hundreds of developers worldwide. It is therefore preferable to address code defects before they are introduced into a widely used software release. Recent wholesale changes to the ATLAS software infrastructure have provided an ideal opportunity to apply software quali...

  2. Dedicated software for diffractive optics design and simulation

    International Nuclear Information System (INIS)

    Firsov, A; Brzhezinskaya, M; Erko, A; Firsov, A; Svintsov, A

    2013-01-01

    An efficient software package for the structure design and simulation of imaging properties of diffraction optical elements has been developed. It operates with point source and consists of: the ZON software, to calculate the structure of an optical element in transmission and reflection; the KRGF software, to simulate the diffraction properties of an ideal optical element with point source; the DS software, to calculate the diffraction properties by taking into consideration material and shadowing effects. Optional software allows simulation with a real non-point source. Zone plate thickness profile, source shape as well as substrate curvature are considered in this calculation. This is especially important for the diffractive focusing elements and gratings at a total external reflection, given that the lateral size of the structure can be up to 1 m. The program package can be used in combination with the Nanomaker software to prepare data for ion and e-beam surface modifications and corrections.

  3. Fostering successful scientific software communities

    Science.gov (United States)

    Bangerth, W.; Heister, T.; Hwang, L.; Kellogg, L. H.

    2016-12-01

    Developing sustainable open source software packages for the sciences appears at first to be primarily a technical challenge: How can one create stable and robust algorithms, appropriate software designs, sufficient documentation, quality assurance strategies such as continuous integration and test suites, or backward compatibility approaches that yield high-quality software usable not only by the authors, but also the broader community of scientists? However, our experience from almost two decades of leading the development of the deal.II software library (http://www.dealii.org, a widely-used finite element package) and the ASPECT code (http://aspect.dealii.org, used to simulate convection in the Earth's mantle) has taught us that technical aspects are not the most difficult ones in scientific open source software. Rather, it is the social challenge of building and maintaining a community of users and developers interested in answering questions on user forums, contributing code, and jointly finding solutions to common technical and non-technical challenges. These problems are posed in an environment where project leaders typically have no resources to reward the majority of contributors, where very few people are specifically paid for the work they do on the project, and with frequent turnover of contributors as project members rotate into and out of jobs. In particular, much software work is done by graduate students who may become fluent enough in a software only a year or two before they leave academia. We will discuss strategies we have found do and do not work in maintaining and growing communities around the scientific software projects we lead. Specifically, we will discuss the management style necessary to keep contributors engaged, ways to give credit where credit is due, and structuring documentation to decrease reliance on forums and thereby allow user communities to grow without straining those who answer questions.

  4. 77 FR 59998 - Self-Regulatory Organizations; The Options Clearing Corporation; Advance Notice Relating to the...

    Science.gov (United States)

    2012-10-01

    ... portfolio at current prices by selling the net long positions and buying in the net short positions. The... Accounts, non-Proprietary X-M accounts, and internal non-proprietary cross-margining accounts. All such...

  5. Sandia software guidelines: Software quality planning

    Energy Technology Data Exchange (ETDEWEB)

    1987-08-01

    This volume is one in a series of Sandia Software Guidelines intended for use in producing quality software within Sandia National Laboratories. In consonance with the IEEE Standard for Software Quality Assurance Plans, this volume identifies procedures to follow in producing a Software Quality Assurance Plan for an organization or a project, and provides an example project SQA plan. 2 figs., 4 tabs.

  6. Unblockable Compositions of Software Components

    DEFF Research Database (Denmark)

    Dong, Ruzhen; Faber, Johannes; Liu, Zhiming

    2012-01-01

    We present a new automata-based interface model describing the interaction behavior of software components. Contrary to earlier component- or interface-based approaches, the interface model we propose specifies all the non-blockable interaction behaviors of a component with any environment...... composition of interface models preserves unblockable sequences of provided services....

  7. Alien Registration Number Verification via the U.S. Citizenship and Immigration Service's Systematic Alien Verification for Entitlements System

    National Research Council Canada - National Science Library

    Ainslie, Frances M; Buck, Kelly R

    2008-01-01

    The purpose of this study was to evaluate the implications of conducting high-volume automated checks of the United States Citizenship and Immigration Services Systematic Allen Verification for Entitlements System (SAVE...

  8. Software

    Energy Technology Data Exchange (ETDEWEB)

    Macedo, R.; Budd, G.; Ross, E.; Wells, P.

    2010-07-15

    The software section of this journal presented new software programs that have been developed to help in the exploration and development of hydrocarbon resources. Software provider IHS Inc. has made additions to its geological and engineering analysis software tool, IHS PETRA, a product used by geoscientists and engineers to visualize, analyze and manage well production, well log, drilling, reservoir, seismic and other related information. IHS PETRA also includes a directional well module and a decline curve analysis module to improve analysis capabilities in unconventional reservoirs. Petris Technology Inc. has developed a software to help manage the large volumes of data. PetrisWinds Enterprise (PWE) helps users find and manage wellbore data, including conventional wireline and MWD core data; analysis core photos and images; waveforms and NMR; and external files documentation. Ottawa-based Ambercore Software Inc. has been collaborating with Nexen on the Petroleum iQ software for steam assisted gravity drainage (SAGD) producers. Petroleum iQ integrates geology and geophysics data with engineering data in 3D and 4D. Calgary-based Envirosoft Corporation has developed a software that reduces the costly and time-consuming effort required to comply with Directive 39 of the Alberta Energy Resources Conservation Board. The product includes an emissions modelling software. Houston-based Seismic Micro-Technology (SMT) has developed the Kingdom software that features the latest in seismic interpretation. Holland-based Joa Oil and Gas and Calgary-based Computer Modelling Group have both supplied the petroleum industry with advanced reservoir simulation software that enables reservoir interpretation. The 2010 software survey included a guide to new software applications designed to facilitate petroleum exploration, drilling and production activities. Oil and gas producers can use the products for a range of functions, including reservoir characterization and accounting. In

  9. The Making of a Good Woman: Extended Parental Leave Entitlements and Mothers' Work Commitment in Germany.

    Science.gov (United States)

    Gangl, Markus; Ziefle, Andrea

    2015-09-01

    The authors investigate the relationship between family policy and women's attachment to the labor market, focusing specifically on policy feedback on women's subjective work commitment. They utilize a quasi-experimental design to identify normative policy effects from changes in mothers' work commitment in conjunction with two policy changes that significantly extended the length of statutory parental leave entitlements in Germany. Using unique survey data from the German Socio-Economic Panel and difference-in-differences, triple-differenced, and instrumental variables estimators for panel data, they obtain consistent empirical evidence that increasing generosity of leave entitlements led to a decline in mothers' work commitment in both East and West Germany. They also probe potential mediating mechanisms and find strong evidence for role exposure and norm setting effects. Finally, they demonstrate that policy-induced shifts in mothers' preferences have contributed to. retarding women's labor force participation after childbirth in Germany, especially as far as mothers' return to full-time employment is concerned.

  10. Comparison of four software packages applied to a scattering problem

    DEFF Research Database (Denmark)

    Albertsen, Niels Christian; Chesneaux, Jean-Marie; Christiansen, Søren

    1999-01-01

    We investigate characteristic features of four different software packages by applying them to the numerical solution of a non-trivial physical problem in computer simulation, viz., scattering of waves from a sinusoidal boundary. The numerical method used is based on boundary collocation. This le......We investigate characteristic features of four different software packages by applying them to the numerical solution of a non-trivial physical problem in computer simulation, viz., scattering of waves from a sinusoidal boundary. The numerical method used is based on boundary collocation...

  11. Entitlement theory of justice and end-state fairness in the allocation of goods

    OpenAIRE

    Ju, Biung-Ghi; Moreno-Ternero, Juan D.

    2016-01-01

    Robert Nozick allegedly introduced his liberal theory of private ownership as an objection to theories of end-state justice. Nevertheless, we show that, in a stylized framework for the allocation of goods in joint ventures, both approaches can be seen as complementary. More precisely, in such a context, self-ownership (the basis for Nozick's entitlement theory of justice) followed by voluntary transfer (Nozick's principle of just transfer) can lead to end-state fairness (as well as Pareto eff...

  12. Software project estimation the fundamentals for providing high quality information to decision makers

    CERN Document Server

    Abran, Alain

    2015-01-01

    Software projects are often late and over-budget and this leads to major problems for software customers. Clearly, there is a serious issue in estimating a realistic, software project budget. Furthermore, generic estimation models cannot be trusted to provide credible estimates for projects as complex as software projects. This book presents a number of examples using data collected over the years from various organizations building software. It also presents an overview of the non-for-profit organization, which collects data on software projects, the International Software Benchmarking Stan

  13. Neurophysiological analytics for all! Free open-source software tools for documenting, analyzing, visualizing, and sharing using electronic notebooks.

    Science.gov (United States)

    Rosenberg, David M; Horn, Charles C

    2016-08-01

    Neurophysiology requires an extensive workflow of information analysis routines, which often includes incompatible proprietary software, introducing limitations based on financial costs, transfer of data between platforms, and the ability to share. An ecosystem of free open-source software exists to fill these gaps, including thousands of analysis and plotting packages written in Python and R, which can be implemented in a sharable and reproducible format, such as the Jupyter electronic notebook. This tool chain can largely replace current routines by importing data, producing analyses, and generating publication-quality graphics. An electronic notebook like Jupyter allows these analyses, along with documentation of procedures, to display locally or remotely in an internet browser, which can be saved as an HTML, PDF, or other file format for sharing with team members and the scientific community. The present report illustrates these methods using data from electrophysiological recordings of the musk shrew vagus-a model system to investigate gut-brain communication, for example, in cancer chemotherapy-induced emesis. We show methods for spike sorting (including statistical validation), spike train analysis, and analysis of compound action potentials in notebooks. Raw data and code are available from notebooks in data supplements or from an executable online version, which replicates all analyses without installing software-an implementation of reproducible research. This demonstrates the promise of combining disparate analyses into one platform, along with the ease of sharing this work. In an age of diverse, high-throughput computational workflows, this methodology can increase efficiency, transparency, and the collaborative potential of neurophysiological research. Copyright © 2016 the American Physiological Society.

  14. Orthographic Software Modelling: A Novel Approach to View-Based Software Engineering

    Science.gov (United States)

    Atkinson, Colin

    The need to support multiple views of complex software architectures, each capturing a different aspect of the system under development, has been recognized for a long time. Even the very first object-oriented analysis/design methods such as the Booch method and OMT supported a number of different diagram types (e.g. structural, behavioral, operational) and subsequent methods such as Fusion, Kruchten's 4+1 views and the Rational Unified Process (RUP) have added many more views over time. Today's leading modeling languages such as the UML and SysML, are also oriented towards supporting different views (i.e. diagram types) each able to portray a different facets of a system's architecture. More recently, so called enterprise architecture frameworks such as the Zachman Framework, TOGAF and RM-ODP have become popular. These add a whole set of new non-functional views to the views typically emphasized in traditional software engineering environments.

  15. Software Design for Smile Analysis

    Directory of Open Access Journals (Sweden)

    A. Sarkhosh

    2010-12-01

    Full Text Available Introduction: Esthetics and attractiveness of the smile is one of the major demands in contemporary orthodontic treatment. In order to improve a smile design, it is necessary to record “posed smile” as an intentional, non-pressure, static, natural and reproduciblesmile. The record then should be analyzed to determine its characteristics. In this study,we intended to design and introduce a software to analyze the smile rapidly and precisely in order to produce an attractive smile for the patients.Materials and Methods: For this purpose, a practical study was performed to design multimedia software “Smile Analysis” which can receive patients’ photographs and videographs. After giving records to the software, the operator should mark the points and lines which are displayed on the system’s guide and also define the correct scale for each image. Thirty-three variables are measured by the software and displayed on the report page. Reliability of measurements in both image and video was significantly high(=0.7-1.Results: In order to evaluate intra- operator and inter-operator reliability, five cases were selected randomly. Statistical analysis showed that calculations performed in smile analysis software were both valid and highly reliable (for both video and photo.Conclusion: The results obtained from smile analysis could be used in diagnosis,treatment planning and evaluation of the treatment progress.

  16. Examining software complexity and quality for scientific software

    International Nuclear Information System (INIS)

    Kelly, D.; Shepard, T.

    2005-01-01

    Research has not found a simple relationship between software complexity and software quality, and particularly no relationship between commonly used software complexity metrics and the occurrence of software faults. A study with an example of scientific software from the nuclear power industry illustrates the importance of addressing cognitive complexity, the complexity related to understanding the intellectual content of the software. Simple practices such as aptly-named variables contributes more to high quality software than limiting code sizes. This paper examines the research into complexity and quality and reports on a longitudinal study using the example of nuclear software. (author)

  17. Modernization of tank floor scanning system (TAFLOSS) software

    International Nuclear Information System (INIS)

    Mohd Fitri Abdul Rahman; Jaafar Abdullah; Susan Maria Sipaun

    2002-01-01

    Tank Floor Scanning System (TAFLOSS) is a portable nucleonic device based on the scattering and moderation phenomena of neutrons. TAFLOSS, which was developed by MINT, can precisely and non-destructively measure the gap and hydrogen content in the foundation of a gigantic industrial tank in a practical and cost-effective manner. In recording and analysing measured data, three different computer software were used. In analysing the initial data, a Disk Operating System (DOS) based software called MesTank 3.0 have been developed. The system also used commercial software such as Table Curve 2D and SURFER for graphics purposes. Table Curve 2D was used to plot and evaluate curve fitting, whereas SURFER software used to draw contours. It is not user friendly and time consuming to switch from a software to another software for different tasks of this system. Therefore, the main objective of the project is to develop new user-friendly software that combined the old and commercial software into a single package. The computer programming language that was used to develop the software is Microsoft Visual C++ ver. 6.0. The process of developing this software involved complex mathematical calculation, curve fitting and contour plot. This paper describes the initial development of a computer programme for analysing the initial data and plotting exponential curve fitting. (Author)

  18. Product-oriented Software Certification Process for Software Synthesis

    Science.gov (United States)

    Nelson, Stacy; Fischer, Bernd; Denney, Ewen; Schumann, Johann; Richardson, Julian; Oh, Phil

    2004-01-01

    The purpose of this document is to propose a product-oriented software certification process to facilitate use of software synthesis and formal methods. Why is such a process needed? Currently, software is tested until deemed bug-free rather than proving that certain software properties exist. This approach has worked well in most cases, but unfortunately, deaths still occur due to software failure. Using formal methods (techniques from logic and discrete mathematics like set theory, automata theory and formal logic as opposed to continuous mathematics like calculus) and software synthesis, it is possible to reduce this risk by proving certain software properties. Additionally, software synthesis makes it possible to automate some phases of the traditional software development life cycle resulting in a more streamlined and accurate development process.

  19. Design of multiplier-less sharp non-uniform cosine modulated filter banks for efficient channelizers in software defined radio

    Directory of Open Access Journals (Sweden)

    Shaeen Kalathil

    2016-03-01

    Full Text Available Forthcoming software defined radios require filter banks which satisfy stringent specifications efficiently with low implementation complexity. Cosine modulated filter banks (CMFB have simple and efficient design procedure. The different wireless standards have different channel spacing or bandwidths and hence demand non-uniform decomposition of subbands. The non-uniform CMFB can be obtained from a uniform CMFB in a simple and efficient approach by merging the adjacent channels of the uniform CMFB. Very narrow transition width filters with low complexity can be achieved using frequency response masking (FRM filter as prototype filter. The complexity is further reduced by the multiplier-less realization of filter banks in which the least number of signed power of two (SPT terms is achieved by representing the filter coefficients using canonic signed digit (CSD representation and then optimizing using suitable modified meta-heuristic algorithms. Hybrid meta-heuristic algorithms are used in this paper. A hybrid algorithm combines the qualities of two meta-heuristic algorithms and results in improved performances with low implementation complexity. Highly frequency selective filter banks characterized by small passband ripple, narrow transition width and high stopband attenuation with non-uniform decomposition of subbands can be designed with least the implementation complexity, using this approach. A digital channelizer can be designed for SDR implementations, using the proposed approach. In this paper, the non-uniform CMFB is designed for various existing wireless standards.

  20. A concept of software testing for SMART MMIS software

    International Nuclear Information System (INIS)

    Seo, Yong Seok; Seong, Seung Hwan; Park, Keun Ok; Hur, Sub; Kim, Dong Hoon

    2001-01-01

    In order to achieve high quality of SMART MMIS software, the well-constructed software testing concept shall be required. This paper established software testing concept which is to be applied to SMART MMIS software, in terms of software testing organization, documentation. procedure, and methods. The software testing methods are classified into source code static analysis and dynamic testing. The software dynamic testing methods are discussed with two aspects: white-box and black-box testing. As software testing concept introduced in this paper is applied to the SMART MMIS software. the high quality of the software will be produced. In the future, software failure data will be collected through the construction of SMART MMIS prototyping facility which the software testing concept of this paper is applied to

  1. Proprietary Schools. Millions Spent To Train Students for Oversupplied Occupations. Report to the Chairman, Subcommittee on Human Resources, Committee on Government Reform and Oversight, House of Representatives.

    Science.gov (United States)

    General Accounting Office, Washington, DC. Health, Education, and Human Services Div.

    The General Accounting Office (GAO) examined the extent to which the financial aid provided under Title IV of the Higher Education Act to students enrolled in proprietary schools is being spent to train individuals for demand occupations. Job opening projections in 12 states were used to estimate job demand, the National Center for Education…

  2. Administrative Cicular No. 31 (Rev. 2) - International indemnity and non-resident allowance

    CERN Multimedia

    Department Head Office - HR Department

    2016-01-01

    Administrative Circular No. 31 (Rev. 2) entitled "International indemnity and non-resident allowance", approved by the Director-General following discussion in the Standing Concertation Committee meeting on 23 June 2016, will be available on 1st September 2016 via the following link: https://cds.cern.ch/record/2208547.   This revised circular cancels and replaces Administrative Circular No. 31 (Rev. 1) also entitled "International indemnity and non-resident allowance" of October 2007. The main changes reflect the decision taken in the framework of the five-yearly review to extend eligibility for international indemnity to all staff members, as well to introduce a distinction between current staff members and those recruited as from 1st September 2016. For the latter, the international indemnity will be calculated as a percentage of the minimum salary of the grade into which they are recruited; the amount granted to the former will not change, and is now expressed ...

  3. Multinomial-exponential reliability function: a software reliability model

    International Nuclear Information System (INIS)

    Saiz de Bustamante, Amalio; Saiz de Bustamante, Barbara

    2003-01-01

    The multinomial-exponential reliability function (MERF) was developed during a detailed study of the software failure/correction processes. Later on MERF was approximated by a much simpler exponential reliability function (EARF), which keeps most of MERF mathematical properties, so the two functions together makes up a single reliability model. The reliability model MERF/EARF considers the software failure process as a non-homogeneous Poisson process (NHPP), and the repair (correction) process, a multinomial distribution. The model supposes that both processes are statistically independent. The paper discusses the model's theoretical basis, its mathematical properties and its application to software reliability. Nevertheless it is foreseen model applications to inspection and maintenance of physical systems. The paper includes a complete numerical example of the model application to a software reliability analysis

  4. Software compensation in Particle Flow reconstruction

    CERN Document Server

    Lan Tran, Huong; Sefkow, Felix; Green, Steven; Marshall, John; Thomson, Mark; Simon, Frank

    2017-01-01

    The Particle Flow approach to calorimetry requires highly granular calorimeters and sophisticated software algorithms in order to reconstruct and identify individual particles in complex event topologies. The high spatial granularity, together with analog energy information, can be further exploited in software compensation. In this approach, the local energy density is used to discriminate electromagnetic and purely hadronic sub-showers within hadron showers in the detector to improve the energy resolution for single particles by correcting for the intrinsic non-compensation of the calorimeter system. This improvement in the single particle energy resolution also results in a better overall jet energy resolution by improving the energy measurement of identified neutral hadrons and improvements in the pattern recognition stage by a more accurate matching of calorimeter energies to tracker measurements. This paper describes the software compensation technique and its implementation in Particle Flow reconstruct...

  5. Software compensation in particle flow reconstruction

    Energy Technology Data Exchange (ETDEWEB)

    Tran, Huong Lan; Krueger, Katja; Sefkow, Felix [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Green, Steven; Marshall, John; Thomson, Mark [Cavendish Laboratory, Cambridge (United Kingdom); Simon, Frank [Max-Planck-Institut fuer Physik, Muenchen (Germany)

    2017-10-15

    The particle flow approach to calorimetry benefits from highly granular calorimeters and sophisticated software algorithms in order to reconstruct and identify individual particles in complex event topologies. The high spatial granularity, together with analogue energy information, can be further exploited in software compensation. In this approach, the local energy density is used to discriminate electromagnetic and purely hadronic sub-showers within hadron showers in the detector to improve the energy resolution for single particles by correcting for the intrinsic non-compensation of the calorimeter system. This improvement in the single particle energy resolution also results in a better overall jet energy resolution by improving the energy measurement of identified neutral hadrons and improvements in the pattern recognition stage by a more accurate matching of calorimeter energies to tracker measurements. This paper describes the software compensation technique and its implementation in particle flow reconstruction with the Pandora Particle Flow Algorithm (PandoraPFA). The impact of software compensation on the choice of optimal transverse granularity for the analogue hadronic calorimeter option of the International Large Detector (ILD) concept is also discussed.

  6. Software compensation in particle flow reconstruction

    Energy Technology Data Exchange (ETDEWEB)

    Tran, Huong Lan; Krueger, Katja; Sefkow, Felix [Deutsches Elektronen-Synchrotron DESY, Hamburg (Germany); Green, Steven; Marshall, John; Thomson, Mark [Cavendish Laboratory, Cambridge (United Kingdom); Simon, Frank [Max-Planck-Institut fuer Physik, Muenchen (Germany)

    2017-10-15

    The particle flow approach to calorimetry benefits from highly granular calorimeters and sophisticated software algorithms in order to reconstruct and identify individual particles in complex event topologies. The high spatial granularity, together with analogue energy information, can be further exploited in software compensation. In this approach, the local energy density is used to discriminate electromagnetic and purely hadronic sub-showers within hadron showers in the detector to improve the energy resolution for single particles by correcting for the intrinsic non-compensation of the calorimeter system. This improvement in the single particle energy resolution also results in a better overall jet energy resolution by improving the energy measurement of identified neutral hadrons and improvements in the pattern recognition stage by a more accurate matching of calorimeter energies to tracker measurements. This paper describes the software compensation technique and its implementation in particle flow reconstruction with the Pandora Particle Flow Algorithm (PandoraPFA). The impact of software compensation on the choice of optimal transverse granularity for the analogue hadronic calorimeter option of the International Large Detector (ILD) concept is also discussed. (orig.)

  7. Software compensation in particle flow reconstruction

    International Nuclear Information System (INIS)

    Tran, Huong Lan; Krueger, Katja; Sefkow, Felix; Green, Steven; Marshall, John; Thomson, Mark; Simon, Frank

    2017-10-01

    The particle flow approach to calorimetry benefits from highly granular calorimeters and sophisticated software algorithms in order to reconstruct and identify individual particles in complex event topologies. The high spatial granularity, together with analogue energy information, can be further exploited in software compensation. In this approach, the local energy density is used to discriminate electromagnetic and purely hadronic sub-showers within hadron showers in the detector to improve the energy resolution for single particles by correcting for the intrinsic non-compensation of the calorimeter system. This improvement in the single particle energy resolution also results in a better overall jet energy resolution by improving the energy measurement of identified neutral hadrons and improvements in the pattern recognition stage by a more accurate matching of calorimeter energies to tracker measurements. This paper describes the software compensation technique and its implementation in particle flow reconstruction with the Pandora Particle Flow Algorithm (PandoraPFA). The impact of software compensation on the choice of optimal transverse granularity for the analogue hadronic calorimeter option of the International Large Detector (ILD) concept is also discussed.

  8. Elements of strategic capability for software outsourcing enterprises based on the resource

    Science.gov (United States)

    Shi, Wengeng

    2011-10-01

    Software outsourcing enterprises as an emerging high-tech enterprises, the rise of the speed and the number was very amazing. In addition to Chinese software outsourcing for giving preferential policies, the software outsourcing business has its ability to upgrade, and in general the software companies have not had the related characteristics. View from the resource base of the theory, the analysis software outsourcing companies have the ability and resources of rare and valuable and non-mimic, we try to give an initial framework for theoretical analysis based on this.

  9. Software Maintenance and Evolution: The Implication for Software ...

    African Journals Online (AJOL)

    Software Maintenance and Evolution: The Implication for Software Development. ... Software maintenance is the process of modifying existing operational software by correcting errors, ... EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  10. Short Comm.

    African Journals Online (AJOL)

    OGECHI

    mainframe-based applications, incompatible proprietary hardware platforms, disparate software, ... responding to changing organizational structures; ... (2) The various technologies and equipment that manipulate these resources, and.

  11. 20 CFR 222.54 - When a legally adopted child is dependent-grandchild or stepgrandchild adopted after entitlement.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false When a legally adopted child is dependent-grandchild or stepgrandchild adopted after entitlement. 222.54 Section 222.54 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT FAMILY RELATIONSHIPS Child Support and...

  12. Expert software for accident identification

    International Nuclear Information System (INIS)

    Dobnikar, M.; Nemec, T.; Muehleisen, A.

    2003-01-01

    Each type of an accident in a Nuclear Power Plant (NPP) causes immediately after the start of the accident variations of physical parameters that are typical for that type of the accident thus enabling its identification. Examples of these parameter are: decrease of reactor coolant system pressure, increase of radiation level in the containment, increase of pressure in the containment. An expert software enabling a fast preliminary identification of the type of the accident in Krsko NPP has been developed. As input data selected typical parameters from Emergency Response Data System (ERDS) of the Krsko NPP are used. Based on these parameters the expert software identifies the type of the accident and also provides the user with appropriate references (past analyses and other documentation of such an accident). The expert software is to be used as a support tool by an expert team that forms in case of an emergency at Slovenian Nuclear Safety Administration (SNSA) with the task to determine the cause of the accident, its most probable scenario and the source term. The expert software should provide initial identification of the event, while the final one is still to be made after appropriate assessment of the event by the expert group considering possibility of non-typical events, multiple causes, initial conditions, influences of operators' actions etc. The expert software can be also used as an educational/training tool and even as a simple database of available accident analyses. (author)

  13. Attachment A – General Terms and Conditions of the Contract

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC CRDI

    patent, copyright, trade secret, and proprietary information, techniques, sketches, drawings, models, inventions ..... Quality of Work ... visual material, software, documents, books, pamphlets, memoranda or reports, including translations).

  14. BFPTool: a software tool for analysis of Biomembrane Force Probe experiments.

    Science.gov (United States)

    Šmít, Daniel; Fouquet, Coralie; Doulazmi, Mohamed; Pincet, Frédéric; Trembleau, Alain; Zapotocky, Martin

    2017-01-01

    The Biomembrane Force Probe is an approachable experimental technique commonly used for single-molecule force spectroscopy and experiments on biological interfaces. The technique operates in the range of forces from 0.1 pN to 1000 pN. Experiments are typically repeated many times, conditions are often not optimal, the captured video can be unstable and lose focus; this makes efficient analysis challenging, while out-of-the-box non-proprietary solutions are not freely available. This dedicated tool was developed to integrate and simplify the image processing and analysis of videomicroscopy recordings from BFP experiments. A novel processing feature, allowing the tracking of the pipette, was incorporated to address a limitation of preceding methods. Emphasis was placed on versatility and comprehensible user interface implemented in a graphical form. An integrated analytical tool was implemented to provide a faster, simpler and more convenient way to process and analyse BFP experiments.

  15. Software Engineering Program: Software Process Improvement Guidebook

    Science.gov (United States)

    1996-01-01

    The purpose of this document is to provide experience-based guidance in implementing a software process improvement program in any NASA software development or maintenance community. This guidebook details how to define, operate, and implement a working software process improvement program. It describes the concept of the software process improvement program and its basic organizational components. It then describes the structure, organization, and operation of the software process improvement program, illustrating all these concepts with specific NASA examples. The information presented in the document is derived from the experiences of several NASA software organizations, including the SEL, the SEAL, and the SORCE. Their experiences reflect many of the elements of software process improvement within NASA. This guidebook presents lessons learned in a form usable by anyone considering establishing a software process improvement program within his or her own environment. This guidebook attempts to balance general and detailed information. It provides material general enough to be usable by NASA organizations whose characteristics do not directly match those of the sources of the information and models presented herein. It also keeps the ideas sufficiently close to the sources of the practical experiences that have generated the models and information.

  16. Minerals yearbook, 1991: Thorium. Annual report

    International Nuclear Information System (INIS)

    Hedrick, J.B.

    1992-10-01

    Domestic mine production data for thorium-bearing monazite are developed by the U.S. Bureau of Mines from a voluntary survey of U.S. operations entitled, 'Rare Earths, Thorium, and Scandium.' The one mine to which a survey form was sent responded, representing 100% of domestic production. Mine production data for thorium are withheld to avoid disclosing company proprietary data. Statistics on domestic thorium consumption are developed by surveying various processors and end users, evaluating import-export data, and analyzing Government stockpile shipments

  17. Software quality assurance plans for safety-critical software

    International Nuclear Information System (INIS)

    Liddle, P.

    2006-01-01

    Application software is defined as safety-critical if a fault in the software could prevent the system components from performing their nuclear-safety functions. Therefore, for nuclear-safety systems, the AREVA TELEPERM R XS (TXS) system is classified 1E, as defined in the Inst. of Electrical and Electronics Engineers (IEEE) Std 603-1998. The application software is classified as Software Integrity Level (SIL)-4, as defined in IEEE Std 7-4.3.2-2003. The AREVA NP Inc. Software Program Manual (SPM) describes the measures taken to ensure that the TELEPERM XS application software attains a level of quality commensurate with its importance to safety. The manual also describes how TELEPERM XS correctly performs the required safety functions and conforms to established technical and documentation requirements, conventions, rules, and standards. The program manual covers the requirements definition, detailed design, integration, and test phases for the TELEPERM XS application software, and supporting software created by AREVA NP Inc. The SPM is required for all safety-related TELEPERM XS system applications. The program comprises several basic plans and practices: 1. A Software Quality-Assurance Plan (SQAP) that describes the processes necessary to ensure that the software attains a level of quality commensurate with its importance to safety function. 2. A Software Safety Plan (SSP) that identifies the process to reasonably ensure that safety-critical software performs as intended during all abnormal conditions and events, and does not introduce any new hazards that could jeopardize the health and safety of the public. 3. A Software Verification and Validation (V and V) Plan that describes the method of ensuring the software is in accordance with the requirements. 4. A Software Configuration Management Plan (SCMP) that describes the method of maintaining the software in an identifiable state at all times. 5. A Software Operations and Maintenance Plan (SO and MP) that

  18. Inquiry into Turkey's Educational Technology, Governance, Situational Educational Policy: An Analysis

    Science.gov (United States)

    Tolu, Hüseyin

    2018-01-01

    Investigating the sociology of educational technology can be approached through a series of deliberations based on the interaction between Free/Libre Open Source Software (FLOSS) and Proprietary Close Source Software (PCSS). This article consults public policy discourses of the Fatih project, which is the current educational technology project in…

  19. Intellectual Property Protection of Software – At the Crossroads of Software Patents and Open Source Software

    OpenAIRE

    Tantarimäki, Maria

    2018-01-01

    The thesis considers the intellectual property protection of software in Europe and in the US, which is increasingly important subject as the world is globalizing and digitalizing. The special nature of software has challenges the intellectual property rights. The current protection of software is based on copyright protection but in this thesis, two other options are considered: software patents and open source software. Software patents provide strong protection for software whereas the pur...

  20. Software Quality Assurance in Software Projects: A Study of Pakistan

    OpenAIRE

    Faisal Shafique Butt; Sundus Shaukat; M. Wasif Nisar; Ehsan Ullah Munir; Muhammad Waseem; Kashif Ayyub

    2013-01-01

    Software quality is specific property which tells what kind of standard software should have. In a software project, quality is the key factor of success and decline of software related organization. Many researches have been done regarding software quality. Software related organization follows standards introduced by Capability Maturity Model Integration (CMMI) to achieve good quality software. Quality is divided into three main layers which are Software Quality Assurance (SQA), Software Qu...

  1. MC Marumoagae A NON-MEMBER SPOUSE'S ENTITLEMENT

    African Journals Online (AJOL)

    10332324

    Nevondwe 2012 Insurance and Tax as well as Marumoagae 2013 De Rebus 40, where ... interest" is as an asset in the joint estate of spouses married in community of ... ordering that the member spouse's retirement fund would have to make ..... court and the terms thereof may guide the pension fund scheme on how to deal.

  2. The Relationship between Academic Entitlement, Academic Performance, and Satisfaction with Life in a College Student Population

    Science.gov (United States)

    Reysen, Rebekah H.

    2013-01-01

    Although academic entitlement (AE) has become a popular topic of discussion in the media, it has received very little scholarly focus in the higher education literature to date. AE has been defined as a belief held by students that they deserve high grades in school despite a lack of effort put forth into their work (Chowning & Campbell,…

  3. A software engineering process for safety-critical software application

    International Nuclear Information System (INIS)

    Kang, Byung Heon; Kim, Hang Bae; Chang, Hoon Seon; Jeon, Jong Sun

    1995-01-01

    Application of computer software to safety-critical systems in on the increase. To be successful, the software must be designed and constructed to meet the functional and performance requirements of the system. For safety reason, the software must be demonstrated not only to meet these requirements, but also to operate safely as a component within the system. For longer-term cost consideration, the software must be designed and structured to ease future maintenance and modifications. This paper presents a software engineering process for the production of safety-critical software for a nuclear power plant. The presentation is expository in nature of a viable high quality safety-critical software development. It is based on the ideas of a rational design process and on the experience of the adaptation of such process in the production of the safety-critical software for the shutdown system number two of Wolsung 2, 3 and 4 nuclear power generation plants. This process is significantly different from a conventional process in terms of rigorous software development phases and software design techniques, The process covers documentation, design, verification and testing using mathematically precise notations and highly reviewable tabular format to specify software requirements and software requirements and software requirements and code against software design using static analysis. The software engineering process described in this paper applies the principle of information-hiding decomposition in software design using a modular design technique so that when a change is required or an error is detected, the affected scope can be readily and confidently located. it also facilitates a sense of high degree of confidence in the 'correctness' of the software production, and provides a relatively simple and straightforward code implementation effort. 1 figs., 10 refs. (Author)

  4. Software architecture analysis tool : software architecture metrics collection

    NARCIS (Netherlands)

    Muskens, J.; Chaudron, M.R.V.; Westgeest, R.

    2002-01-01

    The Software Engineering discipline lacks the ability to evaluate software architectures. Here we describe a tool for software architecture analysis that is based on metrics. Metrics can be used to detect possible problems and bottlenecks in software architectures. Even though metrics do not give a

  5. Automating risk analysis of software design models.

    Science.gov (United States)

    Frydman, Maxime; Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P

    2014-01-01

    The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance.

  6. Customer Interaction in Software Development: A Comparison of Software Methodologies Deployed in Namibian Software Firms

    CSIR Research Space (South Africa)

    Iyawa, GE

    2016-01-01

    Full Text Available within the Namibian context. An implication for software project managers and software developers is that customer interaction should be properly managed to ensure that the software methodologies for improving software development processes...

  7. Regulations implementing the Byrd Amendments to the Black Lung Benefits Act: determining coal miners' and survivors' entitlement to benefits. Final rule.

    Science.gov (United States)

    2013-09-25

    This final rule revises the Black Lung Benefits Act (BLBA or Act) regulations to implement amendments made by the Patient Protection and Affordable Care Act (ACA). The ACA amended the BLBA in two ways. First, it revived a rebuttable presumption of total disability or death due to pneumoconiosis for certain claims. Second, it reinstituted automatic entitlement to benefits for certain eligible survivors of coal miners whose lifetime benefit claims were awarded because they were totally disabled due to pneumoconiosis. These regulations clarify how the statutory presumption may be invoked and rebutted and the application and scope of the survivor-entitlement provision. The rule also eliminates several unnecessary or obsolete provisions.

  8. Software for Probabilistic Risk Reduction

    Science.gov (United States)

    Hensley, Scott; Michel, Thierry; Madsen, Soren; Chapin, Elaine; Rodriguez, Ernesto

    2004-01-01

    A computer program implements a methodology, denoted probabilistic risk reduction, that is intended to aid in planning the development of complex software and/or hardware systems. This methodology integrates two complementary prior methodologies: (1) that of probabilistic risk assessment and (2) a risk-based planning methodology, implemented in a prior computer program known as Defect Detection and Prevention (DDP), in which multiple requirements and the beneficial effects of risk-mitigation actions are taken into account. The present methodology and the software are able to accommodate both process knowledge (notably of the efficacy of development practices) and product knowledge (notably of the logical structure of a system, the development of which one seeks to plan). Estimates of the costs and benefits of a planned development can be derived. Functional and non-functional aspects of software can be taken into account, and trades made among them. It becomes possible to optimize the planning process in the sense that it becomes possible to select the best suite of process steps and design choices to maximize the expectation of success while remaining within budget.

  9. Cosmetic applications of glucitol-core containing gallotannins from a proprietary phenolic-enriched red maple (Acer rubrum) leaves extract: inhibition of melanogenesis via down-regulation of tyrosinase and melanogenic gene expression in B16F10 melanoma cells.

    Science.gov (United States)

    Ma, Hang; Xu, Jialin; DaSilva, Nicholas A; Wang, Ling; Wei, Zhengxi; Guo, Liangran; Johnson, Shelby L; Lu, Wei; Xu, Jun; Gu, Qiong; Seeram, Navindra P

    2017-05-01

    The red maple (Acer rubrum) is a rich source of phenolic compounds which possess galloyl groups attached to different positions of a 1,5-anhydro-D-glucitol core. While these glucitol-core containing gallotannins (GCGs) have reported anti-oxidant and anti-glycative effects, they have not yet been evaluated for their cosmetic applications. Herein, the anti-tyrosinase and anti-melanogenic effects of a proprietary phenolic-enriched red maple leaves extract [Maplifa ™ ; contains ca. 45% ginnalin A (GA) along with other GCGs] were investigated using enzyme and cellular assays. The GCGs showed anti-tyrosinase activity with IC 50 values ranging from 101.4 to 1047.3 μM and their mechanism of tyrosinase inhibition (using GA as a representative GCG) was evaluated by chelating and computational/modeling studies. GA reduced melanin content in murine melanoma B16F10 cells by 79.1 and 56.7% (at non-toxic concentrations of 25 and 50 μM, respectively), and its mechanisms of anti-melanogenic effects were evaluated by using methods including fluorescent probe (DCF-DA), real-time PCR, and western blot experiments. These data indicated that GA was able to: (1) reduce the levels of reactive oxygen species, (2) down-regulate the expression of MITF, TYR, TRP-1, and TRP-2 gene levels in a time-dependent manner, and (3) significantly reduce protein expression of the TRP-2 gene. Therefore, the anti-melanogenic effects of red maple GCGs warrant further investigation of this proprietary natural product extract for potential cosmetic applications.

  10. PLUME–FEATHER, Referencing and Finding Software for Research and Education

    International Nuclear Information System (INIS)

    Hoffmann, Dirk; Romier, Geneviève

    2012-01-01

    PLUME-FEATHER is a non-profit project created to Promote economicaL, Useful and Maintained softwarE For the Higher Education And THE Research communities. The site references software, mainly Free/Libre Open Source Software (FLOSS) from French universities and national research organisations, (CNRS, INRA…), laboratories or departments as well as other FLOSS software used and evaluated by users within these institutions. Each software is represented by a reference card, which describes origin, aim, installation, cost (if applicable) and user experience from the point of view of an academic user for academic users. Presently over 1000 programs are referenced on PLUME. Although the server is maintained by a french institution, it is completely open to international contributions in the academic domainb. All contained and validated contents are visible to anonymous public, whereas registered users can contribute, starting with comments on single software reference cards up to help with the organisation and presentation of the referenced software products. This first presentation is call for (further) contributions from the HEP community.

  11. Non-Classroom Use of "Presentation Software" in Accelerated Classes: Student Use and Perceptions of Value

    Science.gov (United States)

    Davies, Thomas; Korte, Leon; Cornelsen, Erin

    2016-01-01

    Numerous articles found in education literature discuss the advantages and disadvantages of using "presentation" software to deliver critical course content to students. Frequently the perceived value of the use of software such as PowerPoint is dependent upon how it is used, for instance, the extent to which bells and whistles are…

  12. User interface for a partially incompatible system software environment with non-ADP users

    Energy Technology Data Exchange (ETDEWEB)

    Loffman, R.S.

    1987-08-01

    Good user interfaces to computer systems and software applications are the result of combining an analysis of user needs with knowledge of interface design principles and techniques. This thesis reports on an interface for an environment: (a) that consists of users who are not computer science or data processing professionals; and (b) which is bound by predetermined software and hardware. The interface was designed which combined these considerations with user interface design principles. Current literature was investigated to establish a baseline of knowledge about user interface design. There are many techniques which can be used to implement a user interface, but all should have the same basic goal, which is to assist the user in the performance of a task. This can be accomplished by providing the user with consistent, well-structured interfaces which also provide flexibility to adapt to differences among users. The interface produced used menu selection and command language techniques to make two different operating system environments appear similar. Additional included features helped to address the needs of different users. The original goal was also to make the transition between the two systems transparent. This was not fully accomplished due to software and hardware limitations.

  13. A systematic review of the role of proprietary and patent medicine vendors in healthcare provision in Nigeria.

    Directory of Open Access Journals (Sweden)

    Naomi Beyeler

    Full Text Available Interventions to reduce the burden of disease and mortality in sub-Saharan Africa increasingly recognize the important role that drug retailers play in delivering basic healthcare services. In Nigeria, owner-operated drug retail outlets, known as patent and proprietary medicine vendors (PPMVs, are a main source of medicines for acute conditions, but their practices are not well understood. Greater understanding of the role of PPMVs and the quality of care they provide is needed in order to inform ongoing national health initiatives that aim to incorporate PPMVs as a delivery mechanism.This paper reviews and synthesizes the existing published and grey literature on the characteristics, knowledge and practices of PPMVs in Nigeria. We searched published and grey literature using a number of electronic databases, supplemented with website searches of relevant international agencies. We included all studies providing outcome data on PPMVs in Nigeria, including non-experimental studies, and assessed the rigor of each study using the WHO-Johns Hopkins Rigor scale. We used narrative synthesis to evaluate the findings.We identified 50 articles for inclusion. These studies provided data on a wide range of PPMV outcomes: training; health knowledge; health practices, including drug stocking and dispensing, client interaction, and referral; compliance with regulatory guidelines; and the effects of interventions targeting PPMVs. In general, PPMVs have low health knowledge and poor health treatment practices. However, the literature focuses largely on services for adult malaria, and little is known about other health areas or services for children.This review highlights several concerns with the quality of the private drug retail sector in Nigeria, as well as gaps in the existing evidence base. Future research should adopt a more holistic view of the services provided by PPMV shops, and evaluate intervention strategies that may improve the services provided in

  14. Space Flight Software Development Software for Intelligent System Health Management

    Science.gov (United States)

    Trevino, Luis C.; Crumbley, Tim

    2004-01-01

    The slide presentation examines the Marshall Space Flight Center Flight Software Branch, including software development projects, mission critical space flight software development, software technical insight, advanced software development technologies, and continuous improvement in the software development processes and methods.

  15. Implementation of Digital Watermarking Using MATLAB Software

    OpenAIRE

    Karnpriya Vyas; Kirti Sethiya; Sonu Jain

    2012-01-01

    Digital watermarking holds significant promise as one of the keys to protecting proprietary digital content in the coming years. It focuses on embedding information inside a digital object such that the embedded information is in separable bound to the object. The proposed scheme has been implemented on MATLAB, as it is a high level technical computing language and interactive environment for algorithm development, data visualization, data analysis, and numerical computation. We w...

  16. Il pericolo degli ebook

    Directory of Open Access Journals (Sweden)

    Maria Chiara Pievatolo

    2014-01-01

    Full Text Available I libri stampati: si possono acquistare anonimamente in contanti; quindi se ne è proprietari: non dobbiamo firmare una licenza che ne restringe l’uso: il loro formato è noto e per leggerli non occorrono tecnologie proprietarie; si possono dare, prestare o...

  17. Software attribute visualization for high integrity software

    Energy Technology Data Exchange (ETDEWEB)

    Pollock, G.M.

    1998-03-01

    This report documents a prototype tool developed to investigate the use of visualization and virtual reality technologies for improving software surety confidence. The tool is utilized within the execution phase of the software life cycle. It provides a capability to monitor an executing program against prespecified requirements constraints provided in a program written in the requirements specification language SAGE. The resulting Software Attribute Visual Analysis Tool (SAVAnT) also provides a technique to assess the completeness of a software specification.

  18. ELER software - a new tool for urban earthquake loss assessment

    Science.gov (United States)

    Hancilar, U.; Tuzun, C.; Yenidogan, C.; Erdik, M.

    2010-12-01

    Rapid loss estimation after potentially damaging earthquakes is critical for effective emergency response and public information. A methodology and software package, ELER-Earthquake Loss Estimation Routine, for rapid estimation of earthquake shaking and losses throughout the Euro-Mediterranean region was developed under the Joint Research Activity-3 (JRA3) of the EC FP6 Project entitled "Network of Research Infrastructures for European Seismology-NERIES". Recently, a new version (v2.0) of ELER software has been released. The multi-level methodology developed is capable of incorporating regional variability and uncertainty originating from ground motion predictions, fault finiteness, site modifications, inventory of physical and social elements subjected to earthquake hazard and the associated vulnerability relationships. Although primarily intended for quasi real-time estimation of earthquake shaking and losses, the routine is also equally capable of incorporating scenario-based earthquake loss assessments. This paper introduces the urban earthquake loss assessment module (Level 2) of the ELER software which makes use of the most detailed inventory databases of physical and social elements at risk in combination with the analytical vulnerability relationships and building damage-related casualty vulnerability models for the estimation of building damage and casualty distributions, respectively. Spectral capacity-based loss assessment methodology and its vital components are presented. The analysis methods of the Level 2 module, i.e. Capacity Spectrum Method (ATC-40, 1996), Modified Acceleration-Displacement Response Spectrum Method (FEMA 440, 2005), Reduction Factor Method (Fajfar, 2000) and Coefficient Method (ASCE 41-06, 2006), are applied to the selected building types for validation and verification purposes. The damage estimates are compared to the results obtained from the other studies available in the literature, i.e. SELENA v4.0 (Molina et al., 2008) and

  19. Software cost/resource modeling: Software quality tradeoff measurement

    Science.gov (United States)

    Lawler, R. W.

    1980-01-01

    A conceptual framework for treating software quality from a total system perspective is developed. Examples are given to show how system quality objectives may be allocated to hardware and software; to illustrate trades among quality factors, both hardware and software, to achieve system performance objectives; and to illustrate the impact of certain design choices on software functionality.

  20. 45 CFR 506.18 - Entitlement of survivors to award in case of death of prisoner of war.

    Science.gov (United States)

    2010-10-01

    ... of prisoner of war. 506.18 Section 506.18 Public Welfare Regulations Relating to Public Welfare..., ADMINISTRATION, AND PAYMENT OF CLAIMS UNDER TITLE I OF THE WAR CLAIMS ACT OF 1948, AS AMENDED ELIGIBILITY REQUIREMENTS FOR COMPENSATION Prisoners of War § 506.18 Entitlement of survivors to award in case of death of...

  1. Calculation Software versus Illustration Software for Teaching Statistics

    DEFF Research Database (Denmark)

    Mortensen, Peter Stendahl; Boyle, Robin G.

    1999-01-01

    As personal computers have become more and more powerful, so have the software packages available to us for teaching statistics. This paper investigates what software packages are currently being used by progressive statistics instructors at university level, examines some of the deficiencies...... of such software, and indicates features that statistics instructors wish to have incorporated in software in the future. The basis of the paper is a survey of participants at ICOTS-5 (the Fifth International Conference on Teaching Statistics). These survey results, combined with the software based papers...

  2. Software system safety

    Science.gov (United States)

    Uber, James G.

    1988-01-01

    Software itself is not hazardous, but since software and hardware share common interfaces there is an opportunity for software to create hazards. Further, these software systems are complex, and proven methods for the design, analysis, and measurement of software safety are not yet available. Some past software failures, future NASA software trends, software engineering methods, and tools and techniques for various software safety analyses are reviewed. Recommendations to NASA are made based on this review.

  3. Configuration management plan for the GENII software

    International Nuclear Information System (INIS)

    Rittmann, P.D.

    1994-01-01

    The GENII program calculates doses from radionuclides released into the environment for a variety of possible exposure scenarios. The user prepares an input data file with the necessary modelling assumptions and parameters. The program reads the user's input file, computes the necessary doses and stores these results in an output file. The output file also contains a listing of the user's input and gives the title lines from the data libraries which are accessed in the course of the calculations. The purpose of this document is to provide users of the GENII software with the configuration controls which are planned for use by WHC in accordance with WHC-CM-3-10. The controls are solely for WHC employees. Non-WHC individuals are not excluded, but no promise is made or implied that they will be informed of errors or revisions to the software. The configuration controls cover the GENII software, the GENII user's guide, the list of GENII users at WHC, and the backup copies. Revisions to the software must be approved prior to distribution in accordance with this configuration management plan

  4. Data mining : open systems drill through layers of legacy data to manage the flow of information

    International Nuclear Information System (INIS)

    Polczer, S.

    1999-01-01

    Information management challenges facing the petroleum and natural gas industry are discussed in conjunction with the increasing difficulty of accessing information because of the sheer volume of it, plus the fact that most data systems are proprietary 'closed' systems. In this context, reference is made to a newly developed software system named PetroDesk, developed by Merak Petroleum. PetroDesk is a geographical information browser used for integration and analysis of public, proprietary and personal data under a common interface. The software can be used to plot land position, chart productivity of wells, and produce graphs of decline rates, reserves and production. The software, which was originally designed for engineering data, also has been found useful in determining costs, revenue projections and other information needed to obtain a real-time net present worth of a company, and also in identifying business opportunities. 2 figs

  5. Open-Source as a strategy for operational software - the case of Enki

    Science.gov (United States)

    Kolberg, Sjur; Bruland, Oddbjørn

    2014-05-01

    implications for building and maintaining competence around the source code and the advanced hydrological and statistical routines in Enki. Originally developed by hydrologists, the Enki code is now approaching a state where maintenance requires a background in professional software development. Without the advantage of proprietary source code, both hydrologic improvements and software maintenance depend on donations or development support on a case-to-case basis, a situation well known within the open source community. It remains to see whether these mechanisms suffice to keep Enki at the maintenance level required by the hydropower sector. ENKI is available from www.opensource-enki.org.

  6. Open Source and Proprietary Project Management Tools for SMEs.

    OpenAIRE

    Veronika Abramova; Francisco Pires; Jorge Bernardino

    2017-01-01

    The dimensional growth and increasing difficulty in project management promoted the development of different tools that serve to facilitate project management and track project schedule, resources and overall progress. These tools offer a variety of features, from task and time management, up to integrated CRM (Customer Relationship Management) and ERP (Enterprise Resource Planning) modules. Currently, a large number of project management software is available, to assist project team during t...

  7. Determination of the number of software tests using probabilistic safety assessment

    International Nuclear Information System (INIS)

    Kang, H. K.; Seong, T. Y.; Lee, K. Y.

    2000-01-01

    The broader usage of digital equipment in nuclear power plants gives rise to the safety problems of software. The field test should be performed before the software is used in critical applications because it is well known that software shows non-linear response when it is applied to different target systems in different environment. In the case of safety-critical applications, the result of tests contains usually zero failure case and the satisfiable number of tests is hard to be determined. In this paper, we suggests the method to determine the number of software tests without failure using the probabilistic safety assessment. From the result of the probabilistic safety assessment on total system, the desirable unavailability of software is calculated and the number of tests is determined

  8. Power, Avionics and Software - Phase 1.0:. [Subsystem Integration Test Report

    Science.gov (United States)

    Ivancic, William D.; Sands, Obed S.; Bakula, Casey J.; Oldham, Daniel R.; Wright, Ted; Bradish, Martin A.; Klebau, Joseph M.

    2014-01-01

    This report describes Power, Avionics and Software (PAS) 1.0 subsystem integration testing and test results that occurred in August and September of 2013. This report covers the capabilities of each PAS assembly to meet integration test objectives for non-safety critical, non-flight, non-human-rated hardware and software development. This test report is the outcome of the first integration of the PAS subsystem and is meant to provide data for subsequent designs, development and testing of the future PAS subsystems. The two main objectives were to assess the ability of the PAS assemblies to exchange messages and to perform audio testing of both inbound and outbound channels. This report describes each test performed, defines the test, the data, and provides conclusions and recommendations.

  9. Avoidable Software Procurements

    Science.gov (United States)

    2012-09-01

    software license, software usage, ELA, Software as a Service , SaaS , Software Asset...PaaS Platform as a Service SaaS Software as a Service SAM Software Asset Management SMS System Management Server SEWP Solutions for Enterprise Wide...delivery of full Cloud Services , we will see the transition of the Cloud Computing service model from Iaas to SaaS , or Software as a Service . Software

  10. Current trends in hardware and software for brain-computer interfaces (BCIs).

    Science.gov (United States)

    Brunner, P; Bianchi, L; Guger, C; Cincotti, F; Schalk, G

    2011-04-01

    A brain-computer interface (BCI) provides a non-muscular communication channel to people with and without disabilities. BCI devices consist of hardware and software. BCI hardware records signals from the brain, either invasively or non-invasively, using a series of device components. BCI software then translates these signals into device output commands and provides feedback. One may categorize different types of BCI applications into the following four categories: basic research, clinical/translational research, consumer products, and emerging applications. These four categories use BCI hardware and software, but have different sets of requirements. For example, while basic research needs to explore a wide range of system configurations, and thus requires a wide range of hardware and software capabilities, applications in the other three categories may be designed for relatively narrow purposes and thus may only need a very limited subset of capabilities. This paper summarizes technical aspects for each of these four categories of BCI applications. The results indicate that BCI technology is in transition from isolated demonstrations to systematic research and commercial development. This process requires several multidisciplinary efforts, including the development of better integrated and more robust BCI hardware and software, the definition of standardized interfaces, and the development of certification, dissemination and reimbursement procedures.

  11. Current trends in hardware and software for brain-computer interfaces (BCIs)

    Science.gov (United States)

    Brunner, P.; Bianchi, L.; Guger, C.; Cincotti, F.; Schalk, G.

    2011-04-01

    A brain-computer interface (BCI) provides a non-muscular communication channel to people with and without disabilities. BCI devices consist of hardware and software. BCI hardware records signals from the brain, either invasively or non-invasively, using a series of device components. BCI software then translates these signals into device output commands and provides feedback. One may categorize different types of BCI applications into the following four categories: basic research, clinical/translational research, consumer products, and emerging applications. These four categories use BCI hardware and software, but have different sets of requirements. For example, while basic research needs to explore a wide range of system configurations, and thus requires a wide range of hardware and software capabilities, applications in the other three categories may be designed for relatively narrow purposes and thus may only need a very limited subset of capabilities. This paper summarizes technical aspects for each of these four categories of BCI applications. The results indicate that BCI technology is in transition from isolated demonstrations to systematic research and commercial development. This process requires several multidisciplinary efforts, including the development of better integrated and more robust BCI hardware and software, the definition of standardized interfaces, and the development of certification, dissemination and reimbursement procedures.

  12. 78 FR 44163 - Notice of Intent To Grant Exclusive License

    Science.gov (United States)

    2013-07-23

    ... software and its documentation described in NASA Case Nos. ARC-16406-1C entitled ``APT (Analysis, Planning & Tracking) `Database in a Box' ''; NASA Case No. ARC-16507-1 entitled ``Quarterly Reporting Display Tool (QuRDT)''; NASA Case No. ARC-16627-1 entitled ``FTE Labor Tracker''; and NASA Case No. ARC-16693-1...

  13. Quality control in dual head γ-cameras: comparison between methods and software s used for image analysis

    International Nuclear Information System (INIS)

    Nayl E, A.; Fornasier, M. R.; De Denaro, M.; Sulieman, A.; Alkhorayef, M.; Bradley, D.

    2017-10-01

    Patient radiation dose and image quality are the main issues in nuclear medicine (Nm) procedures. Currently, many protocols are used for image acquisition and analysis of quality control (Qc) tests. National Electrical Manufacturers Association (Nema) methods and protocols are widely accepted method used for providing accurate description, measurement and reporting of γ-camera performance parameters. However, no standard software is available for image analysis. The aim os this study was to compare between the vendor Qc software analysis and three software from different developers downloaded free from internet; NMQC, Nm Tool kit and ImageJ-Nm Tool kit software. The three software are used for image analysis of some Qc tests for γ-cameras based on Nema protocols including non-uniformity evaluation. Ten non-uniformity Qc images were taken from dual head γ-camera (Siemens Symbia) installed in Trieste general hospital (Italy), and analyzed. Excel analysis was used as baseline calculation of the non-uniformity test according Nema procedures. The results of the non-uniformity analysis showed good agreement between the three independent software and excel calculation (the average differences were 0.3%, 2.9%, 1.3% and 1.6% for UFOV integral, UFOV differential, CFOV integral and CFOV differential respectively), while significant difference was detected on the analysis of the company Qc software with compare to the excel analysis (the average differences were 14.6%, 20.7%, 25.7% and 31.9% for UFOV integral, UFOV differential, CFOV integral and CFOV differential respectively). NMQC software was the best in comparison with the excel calculations. The variation in the results is due to different pixel sizes used for analysis in the three software and the γ-camera Qc software. Therefore, is important to perform the tests by the vendor Qc software as well as by independent analysis to understand the differences between the values. Moreover, the medical physicist should know

  14. Quality control in dual head γ-cameras: comparison between methods and software s used for image analysis

    Energy Technology Data Exchange (ETDEWEB)

    Nayl E, A. [Sudan Atomic Energy Commission, Radiation Safety Institute, Khartoum (Sudan); Fornasier, M. R.; De Denaro, M. [Azienda Sanitaria Universitaria Integrata di Trieste, Medical Physics Department, Via Giovanni Sai 7, 34128 Trieste (Italy); Sulieman, A. [Prince Sattam bin Abdulaziz University, College of Applied Medical Sciences, Radiology and Medical Imaging Department, P. O. Box 422, 11942 Al-Kharj (Saudi Arabia); Alkhorayef, M.; Bradley, D., E-mail: abdwsh10@hotmail.com [University of Surrey, Department of Physics, GU2-7XH Guildford, Surrey (United Kingdom)

    2017-10-15

    Patient radiation dose and image quality are the main issues in nuclear medicine (Nm) procedures. Currently, many protocols are used for image acquisition and analysis of quality control (Qc) tests. National Electrical Manufacturers Association (Nema) methods and protocols are widely accepted method used for providing accurate description, measurement and reporting of γ-camera performance parameters. However, no standard software is available for image analysis. The aim os this study was to compare between the vendor Qc software analysis and three software from different developers downloaded free from internet; NMQC, Nm Tool kit and ImageJ-Nm Tool kit software. The three software are used for image analysis of some Qc tests for γ-cameras based on Nema protocols including non-uniformity evaluation. Ten non-uniformity Qc images were taken from dual head γ-camera (Siemens Symbia) installed in Trieste general hospital (Italy), and analyzed. Excel analysis was used as baseline calculation of the non-uniformity test according Nema procedures. The results of the non-uniformity analysis showed good agreement between the three independent software and excel calculation (the average differences were 0.3%, 2.9%, 1.3% and 1.6% for UFOV integral, UFOV differential, CFOV integral and CFOV differential respectively), while significant difference was detected on the analysis of the company Qc software with compare to the excel analysis (the average differences were 14.6%, 20.7%, 25.7% and 31.9% for UFOV integral, UFOV differential, CFOV integral and CFOV differential respectively). NMQC software was the best in comparison with the excel calculations. The variation in the results is due to different pixel sizes used for analysis in the three software and the γ-camera Qc software. Therefore, is important to perform the tests by the vendor Qc software as well as by independent analysis to understand the differences between the values. Moreover, the medical physicist should know

  15. 20 CFR 404.340 - How do I become entitled to mother's or father's benefits as a surviving divorced spouse?

    Science.gov (United States)

    2010-04-01

    ... described in § 404.345 or you were deemed to be validly married as described in § 404.346 but the marriage... not entitled to widow's or widower's benefits, or to an old-age benefit that is equal to or larger...

  16. Software engineering

    CERN Document Server

    Sommerville, Ian

    2010-01-01

    The ninth edition of Software Engineering presents a broad perspective of software engineering, focusing on the processes and techniques fundamental to the creation of reliable, software systems. Increased coverage of agile methods and software reuse, along with coverage of 'traditional' plan-driven software engineering, gives readers the most up-to-date view of the field currently available. Practical case studies, a full set of easy-to-access supplements, and extensive web resources make teaching the course easier than ever.

  17. Recent applications for rapid estimation of earthquake shaking and losses with ELER Software

    International Nuclear Information System (INIS)

    Demircioglu, M.B.; Erdik, M.; Kamer, Y.; Sesetyan, K.; Tuzun, C.

    2012-01-01

    A methodology and software package entitled Earthquake Loss Estimation Routine (ELER) was developed for rapid estimation of earthquake shaking and losses throughout the Euro-Mediterranean region. The work was carried out under the Joint Research Activity-3 (JRA3) of the EC FP6 project entitled Network of Research Infrastructures for European Seismology (NERIES). The ELER methodology anticipates: 1) finding of the most likely location of the source of the earthquake using regional seismo-tectonic data base; 2) estimation of the spatial distribution of selected ground motion parameters at engineering bedrock through region specific ground motion prediction models, bias-correcting the ground motion estimations with strong ground motion data, if available; 3) estimation of the spatial distribution of site-corrected ground motion parameters using regional geology database using appropriate amplification models; and 4) estimation of the losses and uncertainties at various orders of sophistication (buildings, casualties). The multi-level methodology developed for real time estimation of losses is capable of incorporating regional variability and sources of uncertainty stemming from ground motion predictions, fault finiteness, site modifications, inventory of physical and social elements subjected to earthquake hazard and the associated vulnerability relationships which are coded into ELER. The present paper provides brief information on the methodology of ELER and provides an example application with the recent major earthquake that hit the Van province in the east of Turkey on 23 October 2011 with moment magnitude (Mw) of 7.2. For this earthquake, Kandilli Observatory and Earthquake Research Institute (KOERI) provided almost real time estimations in terms of building damage and casualty distribution using ELER. (author)

  18. Discovering Software License Constraints : Identifying a Binary’s Sources by Tracing Build Processes

    NARCIS (Netherlands)

    Van der Burg, S.; Davies, J.; Dolstra, E.; German, D.M.; Hemel, A.

    2012-01-01

    With the current proliferation of open source software components, intellectual property in general, and copyright law in particular, has become a critical non-functional requirement for software systems. A key problem in license compliance engineering is that the legal constraints on a product

  19. Use of Commericially Available Software in an Attribute Measurement System

    International Nuclear Information System (INIS)

    MacArthur, Duncan W.; Bracken, David S.; Carrillo, Louis A.; Elmont, Timothy H.; Frame, Katherine C.; Hirsch, Karen L.

    2005-01-01

    A major issue in international safeguards of nuclear materials is the ability to verify that processes and materials in nuclear facilities are consistent with declaration without revealing sensitive information. An attribute measurement system (AMS) is a non-destructive assay (NDA) system that utilizes an information barrier to protect potentially sensitive information about the measurement item. A key component is the software utilized for operator interface, data collection, analysis, and attribute determination, as well as the operating system under which they are implemented. Historically, custom software has been used almost exclusively in transparency applications, and it is unavoidable that some amount of custom software is needed. The focus of this paper is to explore the extent to which commercially available software may be used and the relative merits.

  20. Free software, Open source software, licenses. A short presentation including a procedure for research software and data dissemination

    OpenAIRE

    Gomez-Diaz , Teresa

    2014-01-01

    4 pages. Spanish version: Software libre, software de código abierto, licencias. Donde se propone un procedimiento de distribución de software y datos de investigación; The main goal of this document is to help the research community to understand the basic concepts of software distribution: Free software, Open source software, licenses. This document also includes a procedure for research software and data dissemination.

  1. Tools for Trade Analysis and Open Source Information Monitoring for Non-proliferation

    International Nuclear Information System (INIS)

    Cojazzi, G.G.M.; Versino, C.; Wolfart, E.; Renda, G.; Janssens, W.A.M.; )

    2015-01-01

    The new state level approach being proposed by IAEA envisions an objective based and information driven safeguards approach utilizing all relevant information to improve the effectiveness and efficiency of safeguards. To this goal the IAEA makes also use of open source information, here broadly defined as any information that is neither classified nor proprietary. It includes, but is not limited to: media sources, government and non-governmental reports and analyzes, commercial data, and scientific/technical literature, including trade data. Within the EC support programme to IAEA, JRC has surveyed and catalogued open sources on import-export customs trade data and developed tools for supporting the use of the related databases in safeguards. The JRC software The Big Table, (TBT), supports i.a.: a) the search through a collection of reference documents relevant to trade analysis (legal/regulatory documents, technical handbooks); b) the selection of items of interests to specific verifications and c) the mapping of these items to customs commodities searchable in trade databases. In the field of open source monitoring, JRC is developing and operating a ''Nuclear Security Media Monitor'' (NSMM), which is a web-based multilingual news aggregation system that automatically collects news articles from pre-defined web sites. NSMM is a domain specific version of the general JRC-Europe Media Monitor (EMM). NSMM has been established within the EC support programme with the aim, i.e., to streamline IAEA's process of open source information monitoring. In the first part, the paper will recall the trade data sources relevant for non-proliferation and will then illustrate the main features of TBT, recently coupled with the IAEA Physical Model, and new visualization techniques applied to trade data. In the second part it will present the main aspects of the NSMM also by illustrating some of uses done at JRC. (author)

  2. FOSER - Future of Software Engineering Research

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The 2010 Report of the Presidents Council of Advisors on Science and Technology PCAST, entitled ?Designing a Digital Future: Federally Funded Research and...

  3. 12 CFR 617.7100 - Who must make and who is entitled to receive an effective interest rate disclosure?

    Science.gov (United States)

    2010-01-01

    ... effective interest rate disclosure? 617.7100 Section 617.7100 Banks and Banking FARM CREDIT ADMINISTRATION FARM CREDIT SYSTEM BORROWER RIGHTS Disclosure of Effective Interest Rates § 617.7100 Who must make and who is entitled to receive an effective interest rate disclosure? (a) A qualified lender must make the...

  4. Human Rights Discourse in the Sustainable Development Agenda Avoids Obligations and Entitlements

    Science.gov (United States)

    Williams, Carmel; Blaiklock, Alison

    2016-01-01

    Our commentary on Forman et al paper explores their thesis that right to health language can frame global health policy responses. We examined human rights discourse in the outcome documents from three 2015 United Nations (UN) summits and found rights-related terms are used in all three. However, a deeper examination of the discourse finds the documents do not convey the obligations and entitlements of human rights and international human rights law. The documents contain little that can be used to empower the participation of those already left behind and to hold States and the private sector to account for their human rights duties. This is especially worrying in a neoliberal era. PMID:27285518

  5. Impact of Agile Software Development Model on Software Maintainability

    Science.gov (United States)

    Gawali, Ajay R.

    2012-01-01

    Software maintenance and support costs account for up to 60% of the overall software life cycle cost and often burdens tightly budgeted information technology (IT) organizations. Agile software development approach delivers business value early, but implications on software maintainability are still unknown. The purpose of this quantitative study…

  6. Modern software approaches applied to a Hydrological model: the GEOtop Open-Source Software Project

    Science.gov (United States)

    Cozzini, Stefano; Endrizzi, Stefano; Cordano, Emanuele; Bertoldi, Giacomo; Dall'Amico, Matteo

    2017-04-01

    The GEOtop hydrological scientific package is an integrated hydrological model that simulates the heat and water budgets at and below the soil surface. It describes the three-dimensional water flow in the soil and the energy exchange with the atmosphere, considering the radiative and turbulent fluxes. Furthermore, it reproduces the highly non-linear interactions between the water and energy balance during soil freezing and thawing, and simulates the temporal evolution of snow cover, soil temperature and moisture. The core components of the package were presented in the 2.0 version (Endrizzi et al, 2014), which was released as Free Software Open-source project. However, despite the high scientific quality of the project, a modern software engineering approach was still missing. Such weakness hindered its scientific potential and its use both as a standalone package and, more importantly, in an integrate way with other hydrological software tools. In this contribution we present our recent software re-engineering efforts to create a robust and stable scientific software package open to the hydrological community, easily usable by researchers and experts, and interoperable with other packages. The activity takes as a starting point the 2.0 version, scientifically tested and published. This version, together with several test cases based on recent published or available GEOtop applications (Cordano and Rigon, 2013, WRR, Kollet et al, 2016, WRR) provides the baseline code and a certain number of referenced results as benchmark. Comparison and scientific validation can then be performed for each software re-engineering activity performed on the package. To keep track of any single change the package is published on its own github repository geotopmodel.github.io/geotop/ under GPL v3.0 license. A Continuous Integration mechanism by means of Travis-CI has been enabled on the github repository on master and main development branches. The usage of CMake configuration tool

  7. Create, share and learn. Experiences with free software, free culture and collaboration in formal and non formal education in Colombia

    OpenAIRE

    Medina Cardona, Luis Fernando

    2012-01-01

    New media technologies, specially software have been of great impact in modern society.The combination of computer/software/networks as creative machines is present in everyday life. This article is focused in this interactions specially from the perspective of free open source software (FOSS). In doing so, the influence of its values is traced from the original hacker culture ethics to the free software four freedoms, showing a software explained culture as in the software studies discipline...

  8. Software design practice using two SCADA software packages

    DEFF Research Database (Denmark)

    Basse, K.P.; Christensen, Georg Kronborg; Frederiksen, P. K.

    1996-01-01

    Typical software development for manufacturing control is done either by specialists with consideral real-time programming experience or done by the adaptation of standard software packages for manufacturing control. After investigation and test of two commercial software packages: "InTouch" and ......Touch" and "Fix", it is argued, that a more efficient software solution can be achieved by utilising an integrated specification for SCADA and PLC-programming. Experiences gained from process control is planned investigated for descrete parts manufacturing....

  9. Dynamic Software Updating with Gosh! Current Status and the Road Ahead

    DEFF Research Database (Denmark)

    Gregersen, Allan Raundahl; Rasmussen, Michael; Jørgensen, Bo Nørregaard

    2013-01-01

    Any non-trivial software system has to be upgraded regularly to incorporate bug fixes and security patches or simply to keep up with the inevitable evolution in end-user requirements. Software upgrading is challenging, especially when it comes to online upgrading of running systems. In this paper......, we present the current status of Gosh!, a dynamic-software-updating system for Java, which provides comprehensive support for changing class definitions of live objects, including adding, removing and moving fields, methods, classes and interfaces anywhere in the inheritance hierarchy. Prior...

  10. Software reliability

    CERN Document Server

    Bendell, A

    1986-01-01

    Software Reliability reviews some fundamental issues of software reliability as well as the techniques, models, and metrics used to predict the reliability of software. Topics covered include fault avoidance, fault removal, and fault tolerance, along with statistical methods for the objective assessment of predictive accuracy. Development cost models and life-cycle cost models are also discussed. This book is divided into eight sections and begins with a chapter on adaptive modeling used to predict software reliability, followed by a discussion on failure rate in software reliability growth mo

  11. Open-Source Automated Mapping Four-Point Probe

    Directory of Open Access Journals (Sweden)

    Handy Chandra

    2017-01-01

    Full Text Available Scientists have begun using self-replicating rapid prototyper (RepRap 3-D printers to manufacture open source digital designs of scientific equipment. This approach is refined here to develop a novel instrument capable of performing automated large-area four-point probe measurements. The designs for conversion of a RepRap 3-D printer to a 2-D open source four-point probe (OS4PP measurement device are detailed for the mechanical and electrical systems. Free and open source software and firmware are developed to operate the tool. The OS4PP was validated against a wide range of discrete resistors and indium tin oxide (ITO samples of different thicknesses both pre- and post-annealing. The OS4PP was then compared to two commercial proprietary systems. Results of resistors from 10 to 1 MΩ show errors of less than 1% for the OS4PP. The 3-D mapping of sheet resistance of ITO samples successfully demonstrated the automated capability to measure non-uniformities in large-area samples. The results indicate that all measured values are within the same order of magnitude when compared to two proprietary measurement systems. In conclusion, the OS4PP system, which costs less than 70% of manual proprietary systems, is comparable electrically while offering automated 100 micron positional accuracy for measuring sheet resistance over larger areas.

  12. Open-Source Automated Mapping Four-Point Probe.

    Science.gov (United States)

    Chandra, Handy; Allen, Spencer W; Oberloier, Shane W; Bihari, Nupur; Gwamuri, Jephias; Pearce, Joshua M

    2017-01-26

    Scientists have begun using self-replicating rapid prototyper (RepRap) 3-D printers to manufacture open source digital designs of scientific equipment. This approach is refined here to develop a novel instrument capable of performing automated large-area four-point probe measurements. The designs for conversion of a RepRap 3-D printer to a 2-D open source four-point probe (OS4PP) measurement device are detailed for the mechanical and electrical systems. Free and open source software and firmware are developed to operate the tool. The OS4PP was validated against a wide range of discrete resistors and indium tin oxide (ITO) samples of different thicknesses both pre- and post-annealing. The OS4PP was then compared to two commercial proprietary systems. Results of resistors from 10 to 1 MΩ show errors of less than 1% for the OS4PP. The 3-D mapping of sheet resistance of ITO samples successfully demonstrated the automated capability to measure non-uniformities in large-area samples. The results indicate that all measured values are within the same order of magnitude when compared to two proprietary measurement systems. In conclusion, the OS4PP system, which costs less than 70% of manual proprietary systems, is comparable electrically while offering automated 100 micron positional accuracy for measuring sheet resistance over larger areas.

  13. Software Epistemology

    Science.gov (United States)

    2016-03-01

    in-vitro decision to incubate a startup, Lexumo [7], which is developing a commercial Software as a Service ( SaaS ) vulnerability assessment...LTS Label Transition System MUSE Mining and Understanding Software Enclaves RTEMS Real-Time Executive for Multi-processor Systems SaaS Software ...as a Service SSA Static Single Assignment SWE Software Epistemology UD/DU Def-Use/Use-Def Chains (Dataflow Graph)

  14. Integrating Free and Open Source Solutions into Geospatial Science Education

    Directory of Open Access Journals (Sweden)

    Vaclav Petras

    2015-06-01

    Full Text Available While free and open source software becomes increasingly important in geospatial research and industry, open science perspectives are generally less reflected in universities’ educational programs. We present an example of how free and open source software can be incorporated into geospatial education to promote open and reproducible science. Since 2008 graduate students at North Carolina State University have the opportunity to take a course on geospatial modeling and analysis that is taught with both proprietary and free and open source software. In this course, students perform geospatial tasks simultaneously in the proprietary package ArcGIS and the free and open source package GRASS GIS. By ensuring that students learn to distinguish between geospatial concepts and software specifics, students become more flexible and stronger spatial thinkers when choosing solutions for their independent work in the future. We also discuss ways to continually update and improve our publicly available teaching materials for reuse by teachers, self-learners and other members of the GIS community. Only when free and open source software is fully integrated into geospatial education, we will be able to encourage a culture of openness and, thus, enable greater reproducibility in research and development applications.

  15. Computer software.

    Science.gov (United States)

    Rosenthal, L E

    1986-10-01

    Software is the component in a computer system that permits the hardware to perform the various functions that a computer system is capable of doing. The history of software and its development can be traced to the early nineteenth century. All computer systems are designed to utilize the "stored program concept" as first developed by Charles Babbage in the 1850s. The concept was lost until the mid-1940s, when modern computers made their appearance. Today, because of the complex and myriad tasks that a computer system can perform, there has been a differentiation of types of software. There is software designed to perform specific business applications. There is software that controls the overall operation of a computer system. And there is software that is designed to carry out specialized tasks. Regardless of types, software is the most critical component of any computer system. Without it, all one has is a collection of circuits, transistors, and silicone chips.

  16. Final Project Report Project 10749-4.2.2.1 2007-2009

    Energy Technology Data Exchange (ETDEWEB)

    Zacher, Alan H.; Holladay, Johnathan E.; Frye, J. G.; Brown, Heather M.; Santosa, Daniel M.; Oberg, Aaron A.

    2009-05-11

    This is the final report for the DOE Project 10749-4.2.2.1 for the FY2007 - FY2009 period. This report is non-proprietary, and will be submitted to DOE as a final project report. The report covers activities under the DOE Project inside CRADA 269 (Project 53231) as well as project activites outside of that CRADA (Project 56662). This is the final report that is summarized from the non-proprietary quarterlies submitted to DOE over the past 2.5 years, which in turn are summaries from the proprietary technical reporting to UOP.

  17. ATLAS software stack on ARM64

    CERN Document Server

    Smith, Joshua Wyatt; The ATLAS collaboration

    2016-01-01

    The ATLAS experiment explores new hardware and software platforms that, in the future, may be more suited to its data intensive workloads. One such alternative hardware platform is the ARM architecture, which is designed to be extremely power efficient and is found in most smartphones and tablets. CERN openlab recently installed a small cluster of ARM 64-bit evaluation prototype servers. Each server is based on a single-socket ARM 64-bit system on a chip, with 32 Cortex-A57 cores. In total, each server has 128 GB RAM connected with four fast memory channels. This paper reports on the port of the ATLAS software stack onto these new prototype ARM64 servers. This included building the "external" packages that the ATLAS software relies on. Patches were needed to introduce this new architecture into the build as well as patches that correct for platform specific code that caused failures on non-x86 architectures. These patches were applied such that porting to further platforms will need no or only very little adj...

  18. NASA Software Engineering Benchmarking Study

    Science.gov (United States)

    Rarick, Heather L.; Godfrey, Sara H.; Kelly, John C.; Crumbley, Robert T.; Wifl, Joel M.

    2013-01-01

    .onsolidate, collect and, if needed, develop common processes principles and other assets across the Agency in order to provide more consistency in software development and acquisition practices and to reduce the overall cost of maintaining or increasing current NASA CMMI maturity levels. 6. Provide additional support for small projects that includes: (a) guidance for appropriate tailoring of requirements for small projects, (b) availability of suitable tools, including support tool set-up and training, and (c) training for small project personnel, assurance personnel and technical authorities on the acceptable options for tailoring requirements and performing assurance on small projects. 7. Develop software training classes for the more experienced software engineers using on-line training, videos, or small separate modules of training that can be accommodated as needed throughout a project. 8. Create guidelines to structure non-classroom training opportunities such as mentoring, peer reviews, lessons learned sessions, and on-the-job training. 9. Develop a set of predictive software defect data and a process for assessing software testing metric data against it. 10. Assess Agency-wide licenses for commonly used software tools. 11. Fill the knowledge gap in common software engineering practices for new hires and co-ops.12. Work through the Science, Technology, Engineering and Mathematics (STEM) program with universities in strengthening education in the use of common software engineering practices and standards. 13. Follow up this benchmark study with a deeper look into what both internal and external organizations perceive as the scope of software assurance, the value they expect to obtain from it, and the shortcomings they experience in the current practice. 14. Continue interactions with external software engineering environment through collaborations, knowledge sharing, and benchmarking.

  19. Observation-Driven Configuration of Complex Software Systems

    Science.gov (United States)

    Sage, Aled

    2010-06-01

    The ever-increasing complexity of software systems makes them hard to comprehend, predict and tune due to emergent properties and non-deterministic behaviour. Complexity arises from the size of software systems and the wide variety of possible operating environments: the increasing choice of platforms and communication policies leads to ever more complex performance characteristics. In addition, software systems exhibit different behaviour under different workloads. Many software systems are designed to be configurable so that policies can be chosen to meet the needs of various stakeholders. For complex software systems it can be difficult to accurately predict the effects of a change and to know which configuration is most appropriate. This thesis demonstrates that it is useful to run automated experiments that measure a selection of system configurations. Experiments can find configurations that meet the stakeholders' needs, find interesting behavioural characteristics, and help produce predictive models of the system's behaviour. The design and use of ACT (Automated Configuration Tool) for running such experiments is described, in combination a number of search strategies for deciding on the configurations to measure. Design Of Experiments (DOE) is discussed, with emphasis on Taguchi Methods. These statistical methods have been used extensively in manufacturing, but have not previously been used for configuring software systems. The novel contribution here is an industrial case study, applying the combination of ACT and Taguchi Methods to DC-Directory, a product from Data Connection Ltd (DCL). The case study investigated the applicability of Taguchi Methods for configuring complex software systems. Taguchi Methods were found to be useful for modelling and configuring DC- Directory, making them a valuable addition to the techniques available to system administrators and developers.

  20. PLUME-FEATHER, Referencing and Finding Software for Research and Education

    Science.gov (United States)

    Bénassy, O.; Caron, C.; Ferret-Canape, C.; Cheylus, A.; Courcelle, E.; Dantec, C.; Dayre, P.; Dostes, T.; Durand, A.; Facq, A.; Gambini, G.; Geahchan, E.; Helft, C.; Hoffmann, D.; Ingarao, M.; Joly, P.; Kieffer, J.; Larré, J.-M.; Libes, M.; Morris, F.; Parmentier, H.; Pérochon, L.; Porte, O.; Romier, G.; Rousse, D.; Tournoy, R.; Valeins, H.

    2014-06-01

    PLUME-FEATHER is a non-profit project created to Promote economicaL, Useful and Maintained softwarEFor theHigher Education And THE Research communities. The site references software, mainly Free/Libre Open Source Software (FLOSS) from French universities and national research organisations, (CNRS, INRA...), laboratories or departments as well as other FLOSS software used and evaluated by users within these institutions. Each software is represented by a reference card, which describes origin, aim, installation, cost (if applicable) and user experience from the point of view of an academic user for academic users. Presently over 1000 programs are referenced on PLUME by more than 900 contributors. Although the server is maintained by a French institution, it is open to international contributions in the academic domain. All contained and validated contents are visible to anonymous public, whereas (presently more than 2000) registered users can contribute, starting with comments on single software reference cards up to help with the organisation and presentation of the referenced software products. The project has been presented to the HEP community in 2012 for the first time [1]. This is an update of the status and a call for (further) contributions.

  1. PLUME-FEATHER, referencing and finding software for research and education

    International Nuclear Information System (INIS)

    Bénassy, O; Caron, C; Ferret-Canape, C; Cheylus, A; Courcelle, E; Dantec, C; Dayre, P; Dostes, T; Durand, A; Facq, A; Gambini, G; Morris, F; Geahchan, E; Helft, C; Hoffmann, D; Ingarao, M; Joly, P; Kieffer, J; Larré, J-M; Libes, M

    2014-01-01

    PLUME-FEATHER is a non-profit project created to Promote economicaL, Useful and Maintained softwarEFor theHigher Education And THE Research communities. The site references software, mainly Free/Libre Open Source Software (FLOSS) from French universities and national research organisations, (CNRS, INRA...), laboratories or departments as well as other FLOSS software used and evaluated by users within these institutions. Each software is represented by a reference card, which describes origin, aim, installation, cost (if applicable) and user experience from the point of view of an academic user for academic users. Presently over 1000 programs are referenced on PLUME by more than 900 contributors. Although the server is maintained by a French institution, it is open to international contributions in the academic domain. All contained and validated contents are visible to anonymous public, whereas (presently more than 2000) registered users can contribute, starting with comments on single software reference cards up to help with the organisation and presentation of the referenced software products. The project has been presented to the HEP community in 2012 for the first time [1]. This is an update of the status and a call for (further) contributions.

  2. Transformation of UML Behavioral Diagrams to Support Software Model Checking

    Directory of Open Access Journals (Sweden)

    Luciana Brasil Rebelo dos Santos

    2014-04-01

    Full Text Available Unified Modeling Language (UML is currently accepted as the standard for modeling (object-oriented software, and its use is increasing in the aerospace industry. Verification and Validation of complex software developed according to UML is not trivial due to complexity of the software itself, and the several different UML models/diagrams that can be used to model behavior and structure of the software. This paper presents an approach to transform up to three different UML behavioral diagrams (sequence, behavioral state machines, and activity into a single Transition System to support Model Checking of software developed in accordance with UML. In our approach, properties are formalized based on use case descriptions. The transformation is done for the NuSMV model checker, but we see the possibility in using other model checkers, such as SPIN. The main contribution of our work is the transformation of a non-formal language (UML to a formal language (language of the NuSMV model checker towards a greater adoption in practice of formal methods in software development.

  3. Penn State University ground software support for X-ray missions.

    Science.gov (United States)

    Townsley, L. K.; Nousek, J. A.; Corbet, R. H. D.

    1995-03-01

    The X-ray group at Penn State is charged with two software development efforts in support of X-ray satellite missions. As part of the ACIS instrument team for AXAF, the authors are developing part of the ground software to support the instrument's calibration. They are also designing a translation program for Ginga data, to change it from the non-standard FRF format, which closely parallels the original telemetry format, to FITS.

  4. Materials accounting system for an IBM PC

    International Nuclear Information System (INIS)

    Bearse, R.C.; Thomas, R.J.; Henslee, S.P.; Jackson, B.G.; Tracy, D.B.; Pace, D.M.

    1986-01-01

    We have adapted the Los Alamos MASS accounting system for use on an IBM PC/AT at the Fuels Manufacturing Facility (FMF) at Argonne National Laboratory-West (ANL-WEST) in Idaho Falls, Idaho. Cost of hardware and proprietary software was less than $10,000 per station. The system consists of three stations between which accounting information is transferred using floppy disks accompanying special nuclear material shipments. The programs were implemented in dBASEIII and were compiled using the proprietary software CLIPPER. Modifications to the inventory can be posted in just a few minutes, and operator/computer interaction is nearly instantaneous. After the records are built by the user, it takes 4 to 5 seconds to post the results to the database files. A version of this system was specially adapted and is currently in use at the FMF facility at Argonne National Laboratory in Idaho Falls. Initial satisfaction is adequate and software and hardware problems are minimal

  5. Development of regulation technologies for software verification and validation of I and C systems important to safety in NPPs

    International Nuclear Information System (INIS)

    Kim, Bok Ryul; Oh, S. H.; Zhu, O. P.; Jeong, C. H.; Hwang, H. S.; Goo, C. S.; Chung, Y. H.

    2000-12-01

    The project has provided the draft regulatory policies and guides regarding the quality assurance of software used to I and C systems important to safety in nuclear power plants, differentiated V and V activities by safety classes which are important elements in ensuring software quality assurance, and suggested V and V techniques to be applied, regulatory guides and checklists for reviewing software important to safety. The project introduced the classification concepts on software quality assurance. The I and C systems important to safety are classified into IC-1, IC-2, IC-3, and Non-IC as based on safety classifications. And the software used to these I and C systems are classified into 3 categories, say, safety-critical software, safety-related software, and non-safety software, in the light of safety importance of functions to be performed. Based upon these safety classifications, the extent of software V and V activities by each class has been differentiated each other. On the other hand, the project has divided software important to safety into newly-developed software and previously-developed software in terms of design and implementation, and provided the draft regulatory guides on each type of software, for instance, newly-developed software, previously-developed software, and software tools

  6. Software engineering laboratory series: Annotated bibliography of software engineering laboratory literature

    Science.gov (United States)

    Morusiewicz, Linda; Valett, Jon

    1992-01-01

    This document is an annotated bibliography of technical papers, documents, and memorandums produced by or related to the Software Engineering Laboratory. More than 100 publications are summarized. These publications cover many areas of software engineering and range from research reports to software documentation. This document has been updated and reorganized substantially since the original version (SEL-82-006, November 1982). All materials have been grouped into eight general subject areas for easy reference: (1) the Software Engineering Laboratory; (2) the Software Engineering Laboratory: Software Development Documents; (3) Software Tools; (4) Software Models; (5) Software Measurement; (6) Technology Evaluations; (7) Ada Technology; and (8) Data Collection. This document contains an index of these publications classified by individual author.

  7. Optimization of machining techniques – A retrospective and ...

    Indian Academy of Sciences (India)

    tool designs because these are hidden under computerized databases in proprietary software ... ting speed and feed rate to yield minimum production cost. .... Quality is designed, not manufactured, into the product (Daetz 1987; Taguchi.

  8. Software Engineering Guidebook

    Science.gov (United States)

    Connell, John; Wenneson, Greg

    1993-01-01

    The Software Engineering Guidebook describes SEPG (Software Engineering Process Group) supported processes and techniques for engineering quality software in NASA environments. Three process models are supported: structured, object-oriented, and evolutionary rapid-prototyping. The guidebook covers software life-cycles, engineering, assurance, and configuration management. The guidebook is written for managers and engineers who manage, develop, enhance, and/or maintain software under the Computer Software Services Contract.

  9. From Software Development to Software Assembly

    NARCIS (Netherlands)

    Sneed, Harry M.; Verhoef, Chris

    2016-01-01

    The lack of skilled programming personnel and the growing burden of maintaining customized software are forcing organizations to quit producing their own software. It's high time they turned to ready-made, standard components to fulfill their business requirements. Cloud services might be one way to

  10. Muticriteria decision making model for chosing between open source and non-open source software

    Directory of Open Access Journals (Sweden)

    Edmilson Alves de Moraes

    2008-09-01

    Full Text Available This article proposes the use of a multicriterio method for supporting decision on a problem where the intent is to chose for software given the options of open source and not-open source. The study shows how a method for decison making can be used to provide problem structuration and simplify the decision maker job. The method Analytic Hierarchy Process-AHP is described step-by-step and its benefits and flaws are discussed. Followin the theoretical discussion, a muliple case study is presented, where two companies are to use the decison making method. The analysis was supported by Expert Choice, a software developed based on AHP framework.

  11. Software quality assurance: in large scale and complex software-intensive systems

    NARCIS (Netherlands)

    Mistrik, I.; Soley, R.; Ali, N.; Grundy, J.; Tekinerdogan, B.

    2015-01-01

    Software Quality Assurance in Large Scale and Complex Software-intensive Systems presents novel and high-quality research related approaches that relate the quality of software architecture to system requirements, system architecture and enterprise-architecture, or software testing. Modern software

  12. Great software debates

    CERN Document Server

    Davis, A

    2004-01-01

    The industry’s most outspoken and insightful critic explains how the software industry REALLY works. In Great Software Debates, Al Davis, shares what he has learned about the difference between the theory and the realities of business and encourages you to question and think about software engineering in ways that will help you succeed where others fail. In short, provocative essays, Davis fearlessly reveals the truth about process improvement, productivity, software quality, metrics, agile development, requirements documentation, modeling, software marketing and sales, empiricism, start-up financing, software research, requirements triage, software estimation, and entrepreneurship.

  13. DVS-SOFTWARE: An Effective Tool for Applying Highly Parallelized Hardware To Computational Geophysics

    Science.gov (United States)

    Herrera, I.; Herrera, G. S.

    2015-12-01

    Most geophysical systems are macroscopic physical systems. The behavior prediction of such systems is carried out by means of computational models whose basic models are partial differential equations (PDEs) [1]. Due to the enormous size of the discretized version of such PDEs it is necessary to apply highly parallelized super-computers. For them, at present, the most efficient software is based on non-overlapping domain decomposition methods (DDM). However, a limiting feature of the present state-of-the-art techniques is due to the kind of discretizations used in them. Recently, I. Herrera and co-workers using 'non-overlapping discretizations' have produced the DVS-Software which overcomes this limitation [2]. The DVS-software can be applied to a great variety of geophysical problems and achieves very high parallel efficiencies (90%, or so [3]). It is therefore very suitable for effectively applying the most advanced parallel supercomputers available at present. In a parallel talk, in this AGU Fall Meeting, Graciela Herrera Z. will present how this software is being applied to advance MOD-FLOW. Key Words: Parallel Software for Geophysics, High Performance Computing, HPC, Parallel Computing, Domain Decomposition Methods (DDM)REFERENCES [1]. Herrera Ismael and George F. Pinder, Mathematical Modelling in Science and Engineering: An axiomatic approach", John Wiley, 243p., 2012. [2]. Herrera, I., de la Cruz L.M. and Rosas-Medina A. "Non Overlapping Discretization Methods for Partial, Differential Equations". NUMER METH PART D E, 30: 1427-1454, 2014, DOI 10.1002/num 21852. (Open source) [3]. Herrera, I., & Contreras Iván "An Innovative Tool for Effectively Applying Highly Parallelized Software To Problems of Elasticity". Geofísica Internacional, 2015 (In press)

  14. Automated Cryocooler Monitor and Control System Software

    Science.gov (United States)

    Britchcliffe, Michael J.; Conroy, Bruce L.; Anderson, Paul E.; Wilson, Ahmad

    2011-01-01

    This software is used in an automated cryogenic control system developed to monitor and control the operation of small-scale cryocoolers. The system was designed to automate the cryogenically cooled low-noise amplifier system described in "Automated Cryocooler Monitor and Control System" (NPO-47246), NASA Tech Briefs, Vol. 35, No. 5 (May 2011), page 7a. The software contains algorithms necessary to convert non-linear output voltages from the cryogenic diode-type thermometers and vacuum pressure and helium pressure sensors, to temperature and pressure units. The control function algorithms use the monitor data to control the cooler power, vacuum solenoid, vacuum pump, and electrical warm-up heaters. The control algorithms are based on a rule-based system that activates the required device based on the operating mode. The external interface is Web-based. It acts as a Web server, providing pages for monitor, control, and configuration. No client software from the external user is required.

  15. Computer-Aided Software Engineering - An approach to real-time software development

    Science.gov (United States)

    Walker, Carrie K.; Turkovich, John J.

    1989-01-01

    A new software engineering discipline is Computer-Aided Software Engineering (CASE), a technology aimed at automating the software development process. This paper explores the development of CASE technology, particularly in the area of real-time/scientific/engineering software, and a history of CASE is given. The proposed software development environment for the Advanced Launch System (ALS CASE) is described as an example of an advanced software development system for real-time/scientific/engineering (RT/SE) software. The Automated Programming Subsystem of ALS CASE automatically generates executable code and corresponding documentation from a suitably formatted specification of the software requirements. Software requirements are interactively specified in the form of engineering block diagrams. Several demonstrations of the Automated Programming Subsystem are discussed.

  16. 11 CFR 9004.4 - Use of payments; examples of qualified campaign expenses and non-qualified campaign expenses.

    Science.gov (United States)

    2010-01-01

    ... 11 Federal Elections 1 2010-01-01 2010-01-01 false Use of payments; examples of qualified campaign expenses and non-qualified campaign expenses. 9004.4 Section 9004.4 Federal Elections FEDERAL ELECTION COMMISSION PRESIDENTIAL ELECTION CAMPAIGN FUND: GENERAL ELECTION FINANCING ENTITLEMENT OF ELIGIBLE CANDIDATES...

  17. The influence of software filtering in digital mammography image quality

    Science.gov (United States)

    Michail, C.; Spyropoulou, V.; Kalyvas, N.; Valais, I.; Dimitropoulos, N.; Fountos, G.; Kandarakis, I.; Panayiotakis, G.

    2009-05-01

    Breast cancer is one of the most frequently diagnosed cancers among women. Several techniques have been developed to help in the early detection of breast cancer such as conventional and digital x-ray mammography, positron and single-photon emission mammography, etc. A key advantage in digital mammography is that images can be manipulated as simple computer image files. Thus non-dedicated commercially available image manipulation software can be employed to process and store the images. The image processing tools of the Photoshop (CS 2) software usually incorporate digital filters which may be used to reduce image noise, enhance contrast and increase spatial resolution. However, improving an image quality parameter may result in degradation of another. The aim of this work was to investigate the influence of three sharpening filters, named hereafter sharpen, sharpen more and sharpen edges on image resolution and noise. Image resolution was assessed by means of the Modulation Transfer Function (MTF).In conclusion it was found that the correct use of commercial non-dedicated software on digital mammograms may improve some aspects of image quality.

  18. The influence of software filtering in digital mammography image quality

    International Nuclear Information System (INIS)

    Michail, C; Spyropoulou, V; Valais, I; Panayiotakis, G; Kalyvas, N; Fountos, G; Kandarakis, I; Dimitropoulos, N

    2009-01-01

    Breast cancer is one of the most frequently diagnosed cancers among women. Several techniques have been developed to help in the early detection of breast cancer such as conventional and digital x-ray mammography, positron and single-photon emission mammography, etc. A key advantage in digital mammography is that images can be manipulated as simple computer image files. Thus non-dedicated commercially available image manipulation software can be employed to process and store the images. The image processing tools of the Photoshop (CS 2) software usually incorporate digital filters which may be used to reduce image noise, enhance contrast and increase spatial resolution. However, improving an image quality parameter may result in degradation of another. The aim of this work was to investigate the influence of three sharpening filters, named hereafter sharpen, sharpen more and sharpen edges on image resolution and noise. Image resolution was assessed by means of the Modulation Transfer Function (MTF).In conclusion it was found that the correct use of commercial non-dedicated software on digital mammograms may improve some aspects of image quality.

  19. Model-Based Software Testing for Object-Oriented Software

    Science.gov (United States)

    Biju, Soly Mathew

    2008-01-01

    Model-based testing is one of the best solutions for testing object-oriented software. It has a better test coverage than other testing styles. Model-based testing takes into consideration behavioural aspects of a class, which are usually unchecked in other testing methods. An increase in the complexity of software has forced the software industry…

  20. Software Atom: An approach towards software components structuring to improve reusability

    Directory of Open Access Journals (Sweden)

    Muhammad Hussain Mughal

    2017-12-01

    Full Text Available Diversity of application domain compelled to design sustainable classification scheme for significantly amassing software repository. The atomic reusable software components are articulated to improve the software component reusability in volatile industry.  Numerous approaches of software classification have been proposed over past decades. Each approach has some limitations related to coupling and cohesion. In this paper, we proposed a novel approach by constituting the software based on radical functionalities to improve software reusability. We analyze the element's semantics in Periodic Table used in chemistry to design our classification approach, and present this approach using tree-based classification to curtail software repository search space complexity and further refined based on semantic search techniques. We developed a Global unique Identifier (GUID for indexing the functions and related components. We have exploited the correlation between chemistry element and software elements to simulate one to one mapping between them. Our approach is inspired from sustainability chemical periodic table. We have proposed software periodic table (SPT representing atomic software components extracted from real application software. Based on SPT classified repository tree parsing & extraction to enable the user to program their software by customizing the ingredients of software requirements. The classified repository of software ingredients assist user to exploits their requirements to software engineer and enable requirement engineer to develop a rapid large-scale prototype with great essence. Furthermore, we would predict the usability of the categorized repository based on feedback of users.  The continuous evolution of that proposed repository will be fine-tuned based on utilization and SPT would be gradually optimized by ant colony optimization techniques. Succinctly would provoke automating the software development process.

  1. The ALICE Software Release Validation cluster

    International Nuclear Information System (INIS)

    Berzano, D; Krzewicki, M

    2015-01-01

    One of the most important steps of software lifecycle is Quality Assurance: this process comprehends both automatic tests and manual reviews, and all of them must pass successfully before the software is approved for production. Some tests, such as source code static analysis, are executed on a single dedicated service: in High Energy Physics, a full simulation and reconstruction chain on a distributed computing environment, backed with a sample “golden” dataset, is also necessary for the quality sign off. The ALICE experiment uses dedicated and virtualized computing infrastructures for the Release Validation in order not to taint the production environment (i.e. CVMFS and the Grid) with non-validated software and validation jobs: the ALICE Release Validation cluster is a disposable virtual cluster appliance based on CernVM and the Virtual Analysis Facility, capable of deploying on demand, and with a single command, a dedicated virtual HTCondor cluster with an automatically scalable number of virtual workers on any cloud supporting the standard EC2 interface. Input and output data are externally stored on EOS, and a dedicated CVMFS service is used to provide the software to be validated. We will show how the Release Validation Cluster deployment and disposal are completely transparent for the Release Manager, who simply triggers the validation from the ALICE build system's web interface. CernVM 3, based entirely on CVMFS, permits to boot any snapshot of the operating system in time: we will show how this allows us to certify each ALICE software release for an exact CernVM snapshot, addressing the problem of Long Term Data Preservation by ensuring a consistent environment for software execution and data reprocessing in the future. (paper)

  2. Proceedings of the Fifth Triennial Software Quality Forum 2000, Software for the Next Millennium, Software Quality Forum

    Energy Technology Data Exchange (ETDEWEB)

    Scientific Software Engineering Group, CIC-12

    2000-04-01

    The Software Quality Forum is a triennial conference held by the Software Quality Assurance Subcommittee for the Department of Energy's Quality Managers. The forum centers on key issues, information, and technology important in software development for the Nuclear Weapons Complex. This year it will be opened up to include local information technology companies and software vendors presenting their solutions, ideas, and lessons learned. The Software Quality Forum 2000 will take on a more hands-on, instructional tone than those previously held. There will be an emphasis on providing information, tools, and resources to assist developers in their goal of producing next generation software.

  3. Value of PET-CT and PET-CT combined with lung VCAR software in the diagnosis of hilar area lymph nodes of non-small cell lung cancer

    International Nuclear Information System (INIS)

    Yu Lijuan; Li Yingci; Wang Wenzhi; Wang Xin; Lu Pei'ou; Tian Mohan

    2012-01-01

    Objective: To explore the diagnostic value of PET-CT and PET-CT combined with lung volume computed assisted reading (Lung VCAR) software in hilar area lymph nodes. Methods: Preoperative whole body PET-CT imaging was performed in 49 patients who were highly suspicious of non-small cell lung cancer. PET-CT images of the hilar area lymph nodes and the PET-CT images of the hilar area lymph nodes from Lung VCAR software were evaluated by two experienced doctors, and then compared with the pathological diagnosis. Results: There was no significant difference between the CT values of benign and malignant lymph nodes (t=-1.40, P>0.05). But a significant difference was existed between the benign and malignant hilar lymph nodes with the density visual analysis, the lymph short diameter and the maximum of standardized uptake value (SUV max ) (χ 2 =30.37, 27.40, 20.06, all P<0.05). The sensibility,specificity and accuracy of PET-CT in diagnosis of the hilar area lymph nodes were 76.5%, 90.7%, 88.3% respectively, and the accuracy of the diagnosis was significantly higher than that of CT and PET alone (χ 2 =15.27, P<0.05) using the lymph short diameter ≥1 cm of CT, the density of lymph node is equal to (slightly lower than) the same layer vascular density and the lymph node SUV max ≥2.5 of PET as the diagnostic criteria. One hundred and three hilar area lymph nodes were diagnosed by PET-CT and four nodes were not hilar lymph nodes proved by the Lung VCAR software (3 hilar vascular uptake,1 bronchial cartilage). Conclusion: The methods of PET-CT lymph visual density analysis plus lymph node diameter and SUV max had a high diagnostic accuracy of non-small cell lung hilar lymph. For the PET-CT,the pulmonary vascular uptake was the main cause affecting the discrimination of hilar lymph nodes,while Lung VCAR software was helpful to diagnosis. (authors)

  4. NASA software documentation standard software engineering program

    Science.gov (United States)

    1991-01-01

    The NASA Software Documentation Standard (hereinafter referred to as Standard) can be applied to the documentation of all NASA software. This Standard is limited to documentation format and content requirements. It does not mandate specific management, engineering, or assurance standards or techniques. This Standard defines the format and content of documentation for software acquisition, development, and sustaining engineering. Format requirements address where information shall be recorded and content requirements address what information shall be recorded. This Standard provides a framework to allow consistency of documentation across NASA and visibility into the completeness of project documentation. This basic framework consists of four major sections (or volumes). The Management Plan contains all planning and business aspects of a software project, including engineering and assurance planning. The Product Specification contains all technical engineering information, including software requirements and design. The Assurance and Test Procedures contains all technical assurance information, including Test, Quality Assurance (QA), and Verification and Validation (V&V). The Management, Engineering, and Assurance Reports is the library and/or listing of all project reports.

  5. Science and Software

    Science.gov (United States)

    Zelt, C. A.

    2017-12-01

    Earth science attempts to understand how the earth works. This research often depends on software for modeling, processing, inverting or imaging. Freely sharing open-source software is essential to prevent reinventing the wheel and allows software to be improved and applied in ways the original author may never have envisioned. For young scientists, releasing software can increase their name ID when applying for jobs and funding, and create opportunities for collaborations when scientists who collect data want the software's creator to be involved in their project. However, we frequently hear scientists say software is a tool, it's not science. Creating software that implements a new or better way of earth modeling or geophysical processing, inverting or imaging should be viewed as earth science. Creating software for things like data visualization, format conversion, storage, or transmission, or programming to enhance computational performance, may be viewed as computer science. The former, ideally with an application to real data, can be published in earth science journals, the latter possibly in computer science journals. Citations in either case should accurately reflect the impact of the software on the community. Funding agencies need to support more software development and open-source releasing, and the community should give more high-profile awards for developing impactful open-source software. Funding support and community recognition for software development can have far reaching benefits when the software is used in foreseen and unforeseen ways, potentially for years after the original investment in the software development. For funding, an open-source release that is well documented should be required, with example input and output files. Appropriate funding will provide the incentive and time to release user-friendly software, and minimize the need for others to duplicate the effort. All funded software should be available through a single web site

  6. Automated Bug Assignment: Ensemble-based Machine Learning in Large Scale Industrial Contexts

    OpenAIRE

    Jonsson, Leif; Borg, Markus; Broman, David; Sandahl, Kristian; Eldh, Sigrid; Runeson, Per

    2016-01-01

    Bug report assignment is an important part of software maintenance. In particular, incorrect assignments of bug reports to development teams can be very expensive in large software development projects. Several studies propose automating bug assignment techniques using machine learning in open source software contexts, but no study exists for large-scale proprietary projects in industry. The goal of this study is to evaluate automated bug assignment techniques that are based on machine learni...

  7. Emerging opportunities in enterprise integration with open architecture computer numerical controls

    Science.gov (United States)

    Hudson, Christopher A.

    1997-01-01

    The shift to open-architecture machine tool computer numerical controls is providing new opportunities for metal working oriented manufacturers to streamline the entire 'art to part' process. Production cycle times, accuracy, consistency, predictability and process reliability are just some of the factors that can be improved, leading to better manufactured product at lower costs. Open architecture controllers are allowing manufacturers to apply general purpose software and hardware tools increase where previous approaches relied on proprietary and unique hardware and software. This includes DNC, SCADA, CAD, and CAM, where the increasing use of general purpose components is leading to lower cost system that are also more reliable and robust than the past proprietary approaches. In addition, a number of new opportunities exist, which in the past were likely impractical due to cost or performance constraints.

  8. Pragmatic Software Innovation

    DEFF Research Database (Denmark)

    Aaen, Ivan; Jensen, Rikke Hagensby

    2014-01-01

    We understand software innovation as concerned with introducing innovation into the development of software intensive systems, i.e. systems in which software development and/or integration are dominant considerations. Innovation is key in almost any strategy for competitiveness in existing markets......, for creating new markets, or for curbing rising public expenses, and software intensive systems are core elements in most such strategies. Software innovation therefore is vital for about every sector of the economy. Changes in software technologies over the last decades have opened up for experimentation......, learning, and flexibility in ongoing software projects, but how can this change be used to facilitate software innovation? How can a team systematically identify and pursue opportunities to create added value in ongoing projects? In this paper, we describe Deweyan pragmatism as the philosophical foundation...

  9. AWARE-P: a system-based software for urban water IAM planning

    OpenAIRE

    Coelho, S.T.; Vitorino, D.; Alegre, H.

    2013-01-01

    The AWARE-P IAM planning software offers a non-intrusive, web-based, collaborative integration environment for a wide variety of data and processes that may be relevant to the IAM decision-making process, including maps, GIS shapefiles and geodatabases; inventory records; work orders, maintenance, inspections/CCTV records; network models, performance indicators, asset valuation records, among others. The software provides an organized framework for evaluating and comparing planning alternativ...

  10. Software testability and its application to avionic software

    Science.gov (United States)

    Voas, Jeffrey M.; Miller, Keith W.; Payne, Jeffery E.

    1993-01-01

    Randomly generated black-box testing is an established yet controversial method of estimating software reliability. Unfortunately, as software applications have required higher reliabilities, practical difficulties with black-box testing have become increasingly problematic. These practical problems are particularly acute in life-critical avionics software, where requirements of 10 exp -7 failures per hour of system reliability can translate into a probability of failure (POF) of perhaps 10 exp -9 or less for each individual execution of the software. This paper describes the application of one type of testability analysis called 'sensitivity analysis' to B-737 avionics software; one application of sensitivity analysis is to quantify whether software testing is capable of detecting faults in a particular program and thus whether we can be confident that a tested program is not hiding faults. We so 80 by finding the testabilities of the individual statements of the program, and then use those statement testabilities to find the testabilities of the functions and modules. For the B-737 system we analyzed, we were able to isolate those functions that are more prone to hide errors during system/reliability testing.

  11. The software life cycle

    CERN Document Server

    Ince, Darrel

    1990-01-01

    The Software Life Cycle deals with the software lifecycle, that is, what exactly happens when software is developed. Topics covered include aspects of software engineering, structured techniques of software development, and software project management. The use of mathematics to design and develop computer systems is also discussed. This book is comprised of 20 chapters divided into four sections and begins with an overview of software engineering and software development, paying particular attention to the birth of software engineering and the introduction of formal methods of software develop

  12. Software Engineering Laboratory Series: Collected Software Engineering Papers. Volume 14

    Science.gov (United States)

    1996-01-01

    The Software Engineering Laboratory (SEL) is an organization sponsored by NASA/GSFC and created to investigate the effectiveness of software engineering technologies when applied to the development of application software. The activities, findings, and recommendations of the SEL are recorded in the Software Engineering Laboratory Series, a continuing series of reports that includes this document.

  13. Software Engineering Laboratory Series: Collected Software Engineering Papers. Volume 15

    Science.gov (United States)

    1997-01-01

    The Software Engineering Laboratory (SEL) is an organization sponsored by NASA/GSFC and created to investigate the effectiveness of software engineering technologies when applied to the development of application software. The activities, findings, and recommendations of the SEL are recorded in the Software Engineering Laboratory Series, a continuing series of reports that includes this document.

  14. Software Engineering Laboratory Series: Collected Software Engineering Papers. Volume 13

    Science.gov (United States)

    1995-01-01

    The Software Engineering Laboratory (SEL) is an organization sponsored by NASA/GSFC and created to investigate the effectiveness of software engineering technologies when applied to the development of application software. The activities, findings, and recommendations of the SEL are recorded in the Software Engineering Laboratory Series, a continuing series of reports that includes this document.

  15. Are undocumented migrants’ entitlements and barriers to healthcare a public health challenge for the European Union?

    OpenAIRE

    De Vito, Elisabetta; de Waure, Chiara; Specchia, Maria Lucia; Parente, Paolo; Azzolini, Elena; Frisicale, Emanuela Maria; Favale, Marcella; Teleman, Adele Anna; Ricciardi, Walter

    2016-01-01

    Undocumented migrants (UMs) are at higher risk for health problems because of their irregular status and the consequences of economic and social marginalization. Moreover, the emergent reality of undocumented migration in Europe calls for action in the field of management of UM’s health demands as their access to health services has become a sensitive political and social issue. In this light, this paper aims to address UMs’ entitlement and barriers to healthcare and related policies citing e...

  16. Calidad del software: camino hacia una verdadera industria del software

    Directory of Open Access Journals (Sweden)

    Saulo Ernesto Rojas Salamanca

    1999-07-01

    Full Text Available El software es quizá uno de los productos de la ingeniería que más ha evolucionado en muy poco tiempo, pasando desde el software empírico o artesanal hasta llegar al software desarrollado bajo los principios y herramientas de la ingeniería del software. Sin embargo, dentro de estos cambios, las personas encargadas de la elaboración del software se han enfrentado a problemas muy comunes: unos debido a la exigencia cada vez mayor en la capacidad de resultados del software, debido al permanente cambio de condiciones lo que aumenta su complejidad y obsolescencia; y otros, debido a la carencia de herramientas adecuadas y estándares de tipo organizacional encaminados al mejoramiento de los procesos en el desarrollo del software. Hacia la búsqueda de mecanismos de solución de estos últimos problemas se orienta este artículo...

  17. An experience of qualified preventive screening: shiraz smart screening software.

    Science.gov (United States)

    Islami Parkoohi, Parisa; Zare, Hashem; Abdollahifard, Gholamreza

    2015-01-01

    Computerized preventive screening software is a cost effective intervention tool to address non-communicable chronic diseases. Shiraz Smart Screening Software (SSSS) was developed as an innovative tool for qualified screening. It allows simultaneous smart screening of several high-burden chronic diseases and supports reminder notification functionality. The extent in which SSSS affects screening quality is also described. Following software development, preventive screening and annual health examinations of 261 school staff (Medical School of Shiraz, Iran) was carried out in a software-assisted manner. To evaluate the quality of the software-assisted screening, we used quasi-experimental study design and determined coverage, irregular attendance and inappropriateness proportions in relation with the manual and software-assisted screening as well as the corresponding number of requested tests. In manual screening method, 27% of employees were covered (with 94% irregular attendance) while by software-assisted screening, the coverage proportion was 79% (attendance status will clear after the specified time). The frequency of inappropriate screening test requests, before the software implementation, was 41.37% for fasting plasma glucose, 41.37% for lipid profile, 0.84% for occult blood, 0.19% for flexible sigmoidoscopy/colonoscopy, 35.29% for Pap smear, 19.20% for mammography and 11.2% for prostate specific antigen. All of the above were corrected by the software application. In total, 366 manual screening and 334 software-assisted screening tests were requested. SSSS is an innovative tool to improve the quality of preventive screening plans in terms of increased screening coverage, reduction in inappropriateness and the total number of requested tests.

  18. Workshop on Software Development Tools for Petascale Computing

    Energy Technology Data Exchange (ETDEWEB)

    Vetter, Jeffrey [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Georgia Inst. of Technology, Atlanta, GA (United States)

    2007-08-01

    Petascale computing systems will soon be available to the DOE science community. Recent studies in the productivity of HPC platforms point to better software environments as a key enabler to science on these systems. To prepare for the deployment and productive use of these petascale platforms, the DOE science and general HPC community must have the software development tools, such as performance analyzers and debuggers that meet application requirements for scalability, functionality, reliability, and ease of use. In this report, we identify and prioritize the research opportunities in the area of software development tools for high performance computing. To facilitate this effort, DOE hosted a group of 55 leading international experts in this area at the Software Development Tools for PetaScale Computing (SDTPC) Workshop, which was held in Washington, D.C. on August 1 and 2, 2007. Software development tools serve as an important interface between the application teams and the target HPC architectures. Broadly speaking, these roles can be decomposed into three categories: performance tools, correctness tools, and development environments. Accordingly, this SDTPC report has four technical thrusts: performance tools, correctness tools, development environment infrastructures, and scalable tool infrastructures. The last thrust primarily targets tool developers per se, rather than end users. Finally, this report identifies non-technical strategic challenges that impact most tool development. The organizing committee emphasizes that many critical areas are outside the scope of this charter; these important areas include system software, compilers, and I/O.

  19. Development of an intelligent ultrasonic welding defect classification software

    International Nuclear Information System (INIS)

    Song, Sung Jin; Kim, Hak Joon; Jeong, Hee Don

    1997-01-01

    Ultrasonic pattern recognition is the most effective approach to the problem of discriminating types of flaws in weldments based on ultrasonic flaw signals. In spite of significant progress in the research on this methodology, it has not been widely used in many practical ultrasonic inspections of weldments in industry. Hence, for the convenient application of this approach in many practical situations, we develop an intelligent ultrasonic signature classification software which can discriminate types of flaws in weldments based on their ultrasonic signals using various tools in artificial intelligence such as neural networks. This software shows the excellent performance in an experimental problem where flaws in weldments are classified into two categories of cracks and non-cracks. This performance demonstrates the high possibility of this software as a practical tool for ultrasonic flaw classification in weldments.

  20. Software/hardware distributed processing network supporting the Ada environment

    Science.gov (United States)

    Wood, Richard J.; Pryk, Zen

    1993-09-01

    A high-performance, fault-tolerant, distributed network has been developed, tested, and demonstrated. The network is based on the MIPS Computer Systems, Inc. R3000 Risc for processing, VHSIC ASICs for high speed, reliable, inter-node communications and compatible commercial memory and I/O boards. The network is an evolution of the Advanced Onboard Signal Processor (AOSP) architecture. It supports Ada application software with an Ada- implemented operating system. A six-node implementation (capable of expansion up to 256 nodes) of the RISC multiprocessor architecture provides 120 MIPS of scalar throughput, 96 Mbytes of RAM and 24 Mbytes of non-volatile memory. The network provides for all ground processing applications, has merit for space-qualified RISC-based network, and interfaces to advanced Computer Aided Software Engineering (CASE) tools for application software development.

  1. Using software metrics and software reliability models to attain acceptable quality software for flight and ground support software for avionic systems

    Science.gov (United States)

    Lawrence, Stella

    1992-01-01

    This paper is concerned with methods of measuring and developing quality software. Reliable flight and ground support software is a highly important factor in the successful operation of the space shuttle program. Reliability is probably the most important of the characteristics inherent in the concept of 'software quality'. It is the probability of failure free operation of a computer program for a specified time and environment.

  2. Software Radar Technology

    Directory of Open Access Journals (Sweden)

    Tang Jun

    2015-08-01

    Full Text Available In this paper, the definition and the key features of Software Radar, which is a new concept, are proposed and discussed. We consider the development of modern radar system technology to be divided into three stages: Digital Radar, Software radar and Intelligent Radar, and the second stage is just commencing now. A Software Radar system should be a combination of various modern digital modular components conformed to certain software and hardware standards. Moreover, a software radar system with an open system architecture supporting to decouple application software and low level hardware would be easy to adopt "user requirements-oriented" developing methodology instead of traditional "specific function-oriented" developing methodology. Compared with traditional Digital Radar, Software Radar system can be easily reconfigured and scaled up or down to adapt to the changes of requirements and technologies. A demonstration Software Radar signal processing system, RadarLab 2.0, which has been developed by Tsinghua University, is introduced in this paper and the suggestions for the future development of Software Radar in China are also given in the conclusion.

  3. User's Guide to STAT The SHADWELL Test Analysis Tool (Version 2.0)

    National Research Council Canada - National Science Library

    Hoover, John B

    2008-01-01

    .... The new version removes the dependency on proprietary, third-party software and adds support for several new data input formats, including SHADWELL LabVIEW test data and the Fire and Smoke Simulator (FSSIM) fire model output...

  4. Application of Metric-based Software Reliability Analysis to Example Software

    International Nuclear Information System (INIS)

    Kim, Man Cheol; Smidts, Carol

    2008-07-01

    The software reliability of TELLERFAST ATM software is analyzed by using two metric-based software reliability analysis methods, a state transition diagram-based method and a test coverage-based method. The procedures for the software reliability analysis by using the two methods and the analysis results are provided in this report. It is found that the two methods have a relation of complementary cooperation, and therefore further researches on combining the two methods to reflect the benefit of the complementary cooperative effect to the software reliability analysis are recommended

  5. A new man-machine-interface at BESSY

    International Nuclear Information System (INIS)

    Mueller, R.; Doll, H.D.; Donasch, I.J.; Marxen, H.; Pause, H.

    1991-01-01

    A UIMS (user interface management system) has been developed, that is completely based on non-proprietary software. Central part of the UIMS are processes (mapper) that act as universal X-clients for each specified X-server. Mapper (graphic server) and applications (graphic clients) exchange requests by an event driven interface. The communication protocol is free from any graphical information. The most powerful mapper client is a form interpreter, that can be programmed to act as an equipment access server. Mapper and form interpreter allow to compose control panels and synoptic views of the machine with statements in a simple and comprehensible UIDL (user interface definition language)

  6. Interface-based software testing

    Directory of Open Access Journals (Sweden)

    Aziz Ahmad Rais

    2016-10-01

    Full Text Available Software quality is determined by assessing the characteristics that specify how it should work, which are verified through testing. If it were possible to touch, see, or measure software, it would be easier to analyze and prove its quality. Unfortunately, software is an intangible asset, which makes testing complex. This is especially true when software quality is not a question of particular functions that can be tested through a graphical user interface. The primary objective of software architecture is to design quality of software through modeling and visualization. There are many methods and standards that define how to control and manage quality. However, many IT software development projects still fail due to the difficulties involved in measuring, controlling, and managing software quality. Software quality failure factors are numerous. Examples include beginning to test software too late in the development process, or failing properly to understand, or design, the software architecture and the software component structure. The goal of this article is to provide an interface-based software testing technique that better measures software quality, automates software quality testing, encourages early testing, and increases the software’s overall testability

  7. Agile software assessment

    OpenAIRE

    Nierstrasz Oscar; Lungu Mircea

    2012-01-01

    Informed decision making is a critical activity in software development but it is poorly supported by common development environments which focus mainly on low level programming tasks. We posit the need for agile software assessment which aims to support decision making by enabling rapid and effective construction of software models and custom analyses. Agile software assessment entails gathering and exploiting the broader context of software information related to the system at hand as well ...

  8. Software thresholds alter the bias of actigraphy for monitoring sleep in team-sport athletes.

    Science.gov (United States)

    Fuller, Kate L; Juliff, Laura; Gore, Christopher J; Peiffer, Jeremiah J; Halson, Shona L

    2017-08-01

    Actical ® actigraphy is commonly used to monitor athlete sleep. The proprietary software, called Actiware ® , processes data with three different sleep-wake thresholds (Low, Medium or High), but there is no standardisation regarding their use. The purpose of this study was to examine validity and bias of the sleep-wake thresholds for processing Actical ® sleep data in team sport athletes. Validation study comparing actigraph against accepted gold standard polysomnography (PSG). Sixty seven nights of sleep were recorded simultaneously with polysomnography and Actical ® devices. Individual night data was compared across five sleep measures for each sleep-wake threshold using Actiware ® software. Accuracy of each sleep-wake threshold compared with PSG was evaluated from mean bias with 95% confidence limits, Pearson moment-product correlation and associated standard error of estimate. The Medium threshold generated the smallest mean bias compared with polysomnography for total sleep time (8.5min), sleep efficiency (1.8%) and wake after sleep onset (-4.1min); whereas the Low threshold had the smallest bias (7.5min) for wake bouts. Bias in sleep onset latency was the same across thresholds (-9.5min). The standard error of the estimate was similar across all thresholds; total sleep time ∼25min, sleep efficiency ∼4.5%, wake after sleep onset ∼21min, and wake bouts ∼8 counts. Sleep parameters measured by the Actical ® device are greatly influenced by the sleep-wake threshold applied. In the present study the Medium threshold produced the smallest bias for most parameters compared with PSG. Given the magnitude of measurement variability, confidence limits should be employed when interpreting changes in sleep parameters. Copyright © 2017 Sports Medicine Australia. All rights reserved.

  9. HAZARD ANALYSIS SOFTWARE

    International Nuclear Information System (INIS)

    Sommer, S; Tinh Tran, T.

    2008-01-01

    Washington Safety Management Solutions, LLC developed web-based software to improve the efficiency and consistency of hazard identification and analysis, control selection and classification, and to standardize analysis reporting at Savannah River Site. In the new nuclear age, information technology provides methods to improve the efficiency of the documented safety analysis development process which includes hazard analysis activities. This software provides a web interface that interacts with a relational database to support analysis, record data, and to ensure reporting consistency. A team of subject matter experts participated in a series of meetings to review the associated processes and procedures for requirements and standard practices. Through these meetings, a set of software requirements were developed and compiled into a requirements traceability matrix from which software could be developed. The software was tested to ensure compliance with the requirements. Training was provided to the hazard analysis leads. Hazard analysis teams using the software have verified its operability. The software has been classified as NQA-1, Level D, as it supports the analysis team but does not perform the analysis. The software can be transported to other sites with alternate risk schemes. The software is being used to support the development of 14 hazard analyses. User responses have been positive with a number of suggestions for improvement which are being incorporated as time permits. The software has enforced a uniform implementation of the site procedures. The software has significantly improved the efficiency and standardization of the hazard analysis process

  10. Software and package applicating for network meta-analysis: A usage-based comparative study.

    Science.gov (United States)

    Xu, Chang; Niu, Yuming; Wu, Junyi; Gu, Huiyun; Zhang, Chao

    2017-12-21

    To compare and analyze the characteristics and functions of software applications for network meta-analysis (NMA). PubMed, EMbase, The Cochrane Library, the official websites of Bayesian inference Using Gibbs Sampling (BUGS), Stata and R, and Google were searched to collect the software and packages for performing NMA; software and packages published up to March 2016 were included. After collecting the software, packages, and their user guides, we used the software and packages to calculate a typical example. All characteristics, functions, and computed results were compared and analyzed. Ten types of software were included, including programming and non-programming software. They were developed mainly based on Bayesian or frequentist theory. Most types of software have the characteristics of easy operation, easy mastery, exact calculation, or excellent graphing. However, there was no single software that performed accurate calculations with superior graphing; this could only be achieved through the combination of two or more types of software. This study suggests that the user should choose the appropriate software according to personal programming basis, operational habits, and financial ability. Then, the choice of the combination of BUGS and R (or Stata) software to perform the NMA is considered. © 2017 Chinese Cochrane Center, West China Hospital of Sichuan University and John Wiley & Sons Australia, Ltd.

  11. Framework for Small-Scale Experiments in Software Engineering: Guidance and Control Software Project: Software Engineering Case Study

    Science.gov (United States)

    Hayhurst, Kelly J.

    1998-01-01

    Software is becoming increasingly significant in today's critical avionics systems. To achieve safe, reliable software, government regulatory agencies such as the Federal Aviation Administration (FAA) and the Department of Defense mandate the use of certain software development methods. However, little scientific evidence exists to show a correlation between software development methods and product quality. Given this lack of evidence, a series of experiments has been conducted to understand why and how software fails. The Guidance and Control Software (GCS) project is the latest in this series. The GCS project is a case study of the Requirements and Technical Concepts for Aviation RTCA/DO-178B guidelines, Software Considerations in Airborne Systems and Equipment Certification. All civil transport airframe and equipment vendors are expected to comply with these guidelines in building systems to be certified by the FAA for use in commercial aircraft. For the case study, two implementations of a guidance and control application were developed to comply with the DO-178B guidelines for Level A (critical) software. The development included the requirements, design, coding, verification, configuration management, and quality assurance processes. This paper discusses the details of the GCS project and presents the results of the case study.

  12. Statistical Software Engineering

    Science.gov (United States)

    1998-04-13

    multiversion software subject to coincident errors. IEEE Trans. Software Eng. SE-11:1511-1517. Eckhardt, D.E., A.K Caglayan, J.C. Knight, L.D. Lee, D.F...J.C. and N.G. Leveson. 1986. Experimental evaluation of the assumption of independence in multiversion software. IEEE Trans. Software

  13. ATLAS software stack on ARM64

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00529764; The ATLAS collaboration; Stewart, Graeme; Seuster, Rolf; Quadt, Arnulf

    2017-01-01

    This paper reports on the port of the ATLAS software stack onto new prototype ARM64 servers. This included building the “external” packages that the ATLAS software relies on. Patches were needed to introduce this new architecture into the build as well as patches that correct for platform specific code that caused failures on non-x86 architectures. These patches were applied such that porting to further platforms will need no or only very little adjustments. A few additional modifications were needed to account for the different operating system, Ubuntu instead of Scientific Linux 6 / CentOS7. Selected results from the validation of the physics outputs on these ARM 64-bit servers will be shown. CPU, memory and IO intensive benchmarks using ATLAS specific environment and infrastructure have been performed, with a particular emphasis on the performance vs. energy consumption.

  14. ATLAS software stack on ARM64

    Science.gov (United States)

    Smith, Joshua Wyatt; Stewart, Graeme A.; Seuster, Rolf; Quadt, Arnulf; ATLAS Collaboration

    2017-10-01

    This paper reports on the port of the ATLAS software stack onto new prototype ARM64 servers. This included building the “external” packages that the ATLAS software relies on. Patches were needed to introduce this new architecture into the build as well as patches that correct for platform specific code that caused failures on non-x86 architectures. These patches were applied such that porting to further platforms will need no or only very little adjustments. A few additional modifications were needed to account for the different operating system, Ubuntu instead of Scientific Linux 6 / CentOS7. Selected results from the validation of the physics outputs on these ARM 64-bit servers will be shown. CPU, memory and IO intensive benchmarks using ATLAS specific environment and infrastructure have been performed, with a particular emphasis on the performance vs. energy consumption.

  15. Methodology to evaluate the performance of simulation models for alternative compiler and operating system configurations

    Science.gov (United States)

    Simulation modelers increasingly require greater flexibility for model implementation on diverse operating systems, and they demand high computational speed for efficient iterative simulations. Additionally, model users may differ in preference for proprietary versus open-source software environment...

  16. Addressing Software Engineering Issues in Real-Time Software ...

    African Journals Online (AJOL)

    Addressing Software Engineering Issues in Real-Time Software ... systems, manufacturing process, process control, military, space exploration, and ... but also physical properties such as timeliness, Quality of Service and reliability.

  17. Non-Grey Radiation Modeling using Thermal Desktop/Sindaworks TFAWS06-1009

    Science.gov (United States)

    Anderson, Kevin R.; Paine, Chris

    2006-01-01

    This paper provides an overview of the non-grey radiation modeling capabilities of Cullimore and Ring's Thermal Desktop(Registered TradeMark) Version 4.8 SindaWorks software. The non-grey radiation analysis theory implemented by Sindaworks and the methodology used by the software are outlined. Representative results from a parametric trade study of a radiation shield comprised of a series of v-grooved shaped deployable panels is used to illustrate the capabilities of the SindaWorks non-grey radiation thermal analysis software using emissivities with temperature and wavelength dependency modeled via a Hagen-Rubens relationship.

  18. Analysis approach for common cause failure on non-safety digital control system

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Yun Goo; Oh, Eungse [Korea Hydro and Nuclear Power Co. Ltd., Daejeon (Korea, Republic of)

    2014-05-15

    The effects of common cause failure (CCF) on safety digital instrumentation and control (I and C) system had been considered in defense in depth and diversity coping analysis with safety analysis method. For the non-safety system, single failure had been considered for safety analysis. IEEE Std. 603-1991, Clause 5.6.3.1(2), 'Isolation' states that no credible failure on the non-safety side of an isolation device shall prevent any portion of a safety system from meeting its minimum performance requirements during and following any design basis event requiring that safety function. The software CCF is one of the credible failure on the non-safety side. In advanced digital I and C system, same hardware component is used for different control system and the defect in manufacture or common external event can generate CCF. Moreover, the non-safety I and C system uses complex software for its various function and software quality assurance for the development process is less severe than safety software for the cost effective design. Therefore the potential defects in software cannot be ignored and the effect of software CCF on non-safety I and C system is needed to be evaluated. This paper proposes the general process and considerations for the analysis of CCF on non-safety I and C system.

  19. A portable solution to enable guided ultrasonic inspection

    International Nuclear Information System (INIS)

    Enenkel, Laurent; Buechler, Johannes; Poirier, Jerome; Jervis David

    2012-01-01

    This paper describes the development and application of an innovative ultrasonic (UT) inspection system, which is 100% guided and menu-driven to reduce human error and ensure both inspection accuracy and productivity in the reliable and accurate non-destructive testing (NDT) of shafts, tubes, pipes, and other components and structures. Set-up is menu-directed with the minimum of instrument-specific training, allowing the integral operating software to calculate all the ultrasonic parameters for each task according to the inspection procedure and create an easy-to-follow inspection plan, using either phased array or conventional UT. The operator then scans the work piece, with an encoded scanner, which ensures that the inspection plan is strictly followed. Inspection data is transmitted to a review station in the industry-accepted, non-proprietary DICONDE protocol, allowing advanced analysis tools, such as real time, volume corrected imaging, to allow easier and more reliable image interpretation. By using GEs Rhythm software platform, inspection data can be reviewed and shared, reports generated and inspection results archived for traceability, tracking or further analysis.

  20. Commercial Literacy Software.

    Science.gov (United States)

    Balajthy, Ernest

    1997-01-01

    Presents the first year's results of a continuing project to monitor the availability of software of relevance for literacy education purposes. Concludes there is an enormous amount of software available for use by teachers of reading and literacy--whereas drill-and-practice software is the largest category of software available, large numbers of…