WorldWideScience

Sample records for policy computer file

  1. FORMATION OF A COMPUTER SECURITY POLICY BOARD

    CERN Multimedia

    2001-01-01

    In view of the increasing number of security incidents at CERN, the Directorate has set up a Computer Security Policy Board. Information about the mandate and the meetings of the Board is linked from http://cern.ch/security, which is the entry point for computer security information at CERN. FILE SERVICES COMPUTING RULE The use of CERN's Computing facilities are governed by Operational Circular No 5 and its subsidiary rules. To protect file servers at CERN from unauthorised use, the Organization has issued a new subsidiary rule related to file services. Details hereof and of the complete set of rules applicable to the use of CERN computing facilities are available at http://cern.ch/ComputingRules.

  2. FORMATION OF A COMPUTER SECURITY POLICY BOARD

    CERN Multimedia

    2001-01-01

    In view of the increasing number of security incidents at CERN, the Directorate has set up a Computer Security Policy Board. Information about the mandate and the meetings of the Board is linked from http://cern.ch/security which is the entry point for computer security information at CERN. File Services Computing Rule The use of CERN's Computing facilities are governed by Operational Circular No 5 and its subsidiary rules. To protect file servers at CERN from unauthorised use, the Organization has issued a new subsidiary rule related to file services. Details hereof and of the complete set of rules applicable to the use of CERN computing facilities are available at http://cern.ch/ComputingRules

  3. Security and policy driven computing

    CERN Document Server

    Liu, Lei

    2010-01-01

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses con

  4. Small file aggregation in a parallel computing system

    Science.gov (United States)

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Grider, Gary; Zhang, Jingwang

    2014-09-02

    Techniques are provided for small file aggregation in a parallel computing system. An exemplary method for storing a plurality of files generated by a plurality of processes in a parallel computing system comprises aggregating the plurality of files into a single aggregated file; and generating metadata for the single aggregated file. The metadata comprises an offset and a length of each of the plurality of files in the single aggregated file. The metadata can be used to unpack one or more of the files from the single aggregated file.

  5. 28 CFR 32.2 - Computation of time; filing.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Computation of time; filing. 32.2 Section 32.2 Judicial Administration DEPARTMENT OF JUSTICE PUBLIC SAFETY OFFICERS' DEATH, DISABILITY, AND EDUCATIONAL ASSISTANCE BENEFIT CLAIMS General Provisions § 32.2 Computation of time; filing. (a) In computing...

  6. Documentation of CATHENA input files for the APOLLO computer

    International Nuclear Information System (INIS)

    1988-06-01

    Input files created for the VAX version of the CATHENA two-fluid code have been modified and documented for simulation on the AECB's APOLLO computer system. The input files describe the RD-14 thermalhydraulic loop, the RD-14 steam generator, the RD-12 steam generator blowdown test facility, the Stern Laboratories Cold Water Injection Facility (CWIT), and a CANDU 600 reactor. Sample CATHENA predictions are given and compared with experimental results where applicable. 24 refs

  7. Sharing digital micrographs and other data files between computers.

    Science.gov (United States)

    Entwistle, A

    2004-01-01

    It ought to be easy to exchange digital micrographs and other computer data files with a colleague even on another continent. In practice, this often is not the case. The advantages and disadvantages of various methods that are available for exchanging data files between computers are discussed. When possible, data should be transferred through computer networking. When data are to be exchanged locally between computers with similar operating systems, the use of a local area network is recommended. For computers in commercial or academic environments that have dissimilar operating systems or are more widely spaced, the use of FTPs is recommended. Failing this, posting the data on a website and transferring by hypertext transfer protocol is suggested. If peer to peer exchange between computers in domestic environments is needed, the use of Messenger services such as Microsoft Messenger or Yahoo Messenger is the method of choice. When it is not possible to transfer the data files over the internet, single use, writable CD ROMs are the best media for transferring data. If for some reason this is not possible, DVD-R/RW, DVD+R/RW, 100 MB ZIP disks and USB flash media are potentially useful media for exchanging data files.

  8. NET: an inter-computer file transfer command

    International Nuclear Information System (INIS)

    Burris, R.D.

    1978-05-01

    The NET command was defined and supported in order to facilitate file transfer between computers. Among the goals of the implementation were greatest possible ease of use, maximum power (i.e., support of a diversity of equipment and operations), and protection of the operating system

  9. [Filing and processing systems of ultrasonic images in personal computers].

    Science.gov (United States)

    Filatov, I A; Bakhtin, D A; Orlov, A V

    1994-01-01

    The paper covers the software pattern for the ultrasonic image filing and processing system. The system records images on a computer display in real time or still, processes them by local filtration techniques, makes different measurements and stores the findings in the graphic database. It is stressed that the database should be implemented as a network version.

  10. Analyzing Log Files to Predict Students' Problem Solving Performance in a Computer-Based Physics Tutor

    Science.gov (United States)

    Lee, Young-Jin

    2015-01-01

    This study investigates whether information saved in the log files of a computer-based tutor can be used to predict the problem solving performance of students. The log files of a computer-based physics tutoring environment called Andes Physics Tutor was analyzed to build a logistic regression model that predicted success and failure of students'…

  11. File and metadata management for BESIII distributed computing

    International Nuclear Information System (INIS)

    Nicholson, C; Zheng, Y H; Lin, L; Deng, Z Y; Li, W D; Zhang, X M

    2012-01-01

    The BESIII experiment at the Institute of High Energy Physics (IHEP), Beijing, uses the high-luminosity BEPCII e + e − collider to study physics in the π-charm energy region around 3.7 GeV; BEPCII has produced the worlds largest samples of J/φ and φ’ events to date. An order of magnitude increase in the data sample size over the 2011-2012 data-taking period demanded a move from a very centralized to a distributed computing environment, as well as the development of an efficient file and metadata management system. While BESIII is on a smaller scale than some other HEP experiments, this poses particular challenges for its distributed computing and data management system. These constraints include limited resources and manpower, and low quality of network connections to IHEP. Drawing on the rich experience of the HEP community, a system has been developed which meets these constraints. The design and development of the BESIII distributed data management system, including its integration with other BESIII distributed computing components, such as job management, are presented here.

  12. Arranging and finding folders and files on your Windows 7 computer

    CERN Document Server

    Steps, Studio Visual

    2014-01-01

    If you have lots of documents on your desk, it may prove to be impossible to find the document you are looking for. In order to easily find certain documents, they are often stored in a filing cabinet and arranged in a logical order. The folders on your computer serve the same purpose. They do not just contain files; they can also contain other folders. You can create an unlimited number of folders, and each folder can contain any number of subfolders and files. You can use Windows Explorer, also called the folder window, to work with the files and folders on your computer. You can copy, delete, move, find, and sort files, among other things. Or you can transfer files and folders to a USB stick, an external hard drive, a CD, DVD or Blu-Ray disk. In this practical guide we will show you how to use the folder window, and help you arrange your own files.

  13. Security policies and trust in ubiquitous computing.

    Science.gov (United States)

    Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand

    2008-10-28

    Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.

  14. Methods and apparatus for capture and storage of semantic information with sub-files in a parallel computing system

    Science.gov (United States)

    Faibish, Sorin; Bent, John M; Tzelnic, Percy; Grider, Gary; Torres, Aaron

    2015-02-03

    Techniques are provided for storing files in a parallel computing system using sub-files with semantically meaningful boundaries. A method is provided for storing at least one file generated by a distributed application in a parallel computing system. The file comprises one or more of a complete file and a plurality of sub-files. The method comprises the steps of obtaining a user specification of semantic information related to the file; providing the semantic information as a data structure description to a data formatting library write function; and storing the semantic information related to the file with one or more of the sub-files in one or more storage nodes of the parallel computing system. The semantic information provides a description of data in the file. The sub-files can be replicated based on semantically meaningful boundaries.

  15. Computer Viruses. Legal and Policy Issues Facing Colleges and Universities.

    Science.gov (United States)

    Johnson, David R.; And Others

    Compiled by various members of the higher educational community together with risk managers, computer center managers, and computer industry experts, this report recommends establishing policies on an institutional level to protect colleges and universities from computer viruses and the accompanying liability. Various aspects of the topic are…

  16. RRB / SSI Interface Checkwriting Integrated Computer Operation Extract File (CHICO)

    Data.gov (United States)

    Social Security Administration — This monthly file provides SSA with information about benefit payments made to railroad retirement beneficiaries. SSA uses this data to verify Supplemental Security...

  17. A technique for integrating remote minicomputers into a general computer's file system

    CERN Document Server

    Russell, R D

    1976-01-01

    This paper describes a simple technique for interfacing remote minicomputers used for real-time data acquisition into the file system of a central computer. Developed as part of the ORION system at CERN, this 'File Manager' subsystem enables a program in the minicomputer to access and manipulate files of any type as if they resided on a storage device attached to the minicomputer. Yet, completely transparent to the program, the files are accessed from disks on the central system via high-speed data links, with response times comparable to local storage devices. (6 refs).

  18. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection.

    Science.gov (United States)

    Caruso, Ronald D

    2004-01-01

    Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004

  19. A Semantic Based Policy Management Framework for Cloud Computing Environments

    Science.gov (United States)

    Takabi, Hassan

    2013-01-01

    Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…

  20. Cloud Computing in the EU Policy Sphere

    NARCIS (Netherlands)

    Sluijs, J.P.J.B.; Larouche, P.; Sauter, W.

    2011-01-01

    Cloud computing is a new development that is based on the premise that data and applications are stored centrally and can be accessed through the Internet. Our Article sets up a broad analysis of how the emergence of clouds relates to European law. We single out European competition law, network

  1. A digital imaging teaching file by using the internet, HTML and personal computers

    International Nuclear Information System (INIS)

    Chun, Tong Jin; Jeon, Eun Ju; Baek, Ho Gil; Kang, Eun Joo; Baik, Seung Kug; Choi, Han Yong; Kim, Bong Ki

    1996-01-01

    A film-based teaching file takes up space and the need to search through such a file places limits on the extent to which it is likely to be used. Furthermore it is not easy for doctors in a medium-sized hospital to experience a variety of cases, and so for these reasons we created an easy-to-use digital imaging teaching file with HTML(Hypertext Markup Language) and downloaded images via World Wide Web(WWW) services on the Internet. This was suitable for use by computer novices. We used WWW internet services as a resource for various images and three different IMB-PC compatible computers(386DX, 486DX-II, and Pentium) in downloading the images and in developing a digitalized teaching file. These computers were connected with the Internet through a high speed dial-up modem(28.8Kbps) and to navigate the Internet. Twinsock and Netscape were used. 3.0, Korean word processing software, was used to create HTML(Hypertext Markup Language) files and the downloaded images were linked to the HTML files. In this way, a digital imaging teaching file program was created. Access to a Web service via the Internet required a high speed computer(at least 486DX II with 8MB RAM) for comfortabel use; this also ensured that the quality of downloaded images was not degraded during downloading and that these were good enough to use as a teaching file. The time needed to retrieve the text and related images depends on the size of the file, the speed of the network, and the network traffic at the time of connection. For computer novices, a digital image teaching file using HTML is easy to use. Our method of creating a digital imaging teaching file by using Internet and HTML would be easy to create and radiologists with little computer experience who want to study various digital radiologic imaging cases would find it easy to use

  2. Fast and Easy Searching of Files in Unisys 2200 Computers

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    A program has been written to enable (1) fast and easy searching of symbolic files for one or more strings of characters, dates, or numerical values in specific fields or columns and (2) summarizing results of searching other fields or columns.

  3. Operating Policies and Procedures of Computer Data-Base Systems.

    Science.gov (United States)

    Anderson, David O.

    Speaking on the operating policies and procedures of computer data bases containing information on students, the author divides his remarks into three parts: content decisions, data base security, and user access. He offers nine recommended practices that should increase the data base's usefulness to the user community: (1) the cost of developing…

  4. Computer-assisted health impact assessment for intersectoral health policy

    NARCIS (Netherlands)

    Mooy, J. M.; Gunning-Schepers, L. J.

    2001-01-01

    Intersectoral health policy implies negotiations with politicians outside the health sector. Health politicians have a stronger position if they can quantify health impact. In this Dutch case-study we used a computer simulation approach to answer the following questions: Which anti-tobacco

  5. Computer Forensics Method in Analysis of Files Timestamps in Microsoft Windows Operating System and NTFS File System

    Directory of Open Access Journals (Sweden)

    Vesta Sergeevna Matveeva

    2013-02-01

    Full Text Available All existing file browsers displays 3 timestamps for every file in file system NTFS. Nowadays there are a lot of utilities that can manipulate temporal attributes to conceal the traces of file using. However every file in NTFS has 8 timestamps that are stored in file record and used in detecting the fact of attributes substitution. The authors suggest a method of revealing original timestamps after replacement and automated variant of it in case of a set of files.

  6. The image database management system of teaching file using personal computer

    International Nuclear Information System (INIS)

    Shin, M. J.; Kim, G. W.; Chun, T. J.; Ahn, W. H.; Baik, S. K.; Choi, H. Y.; Kim, B. G.

    1995-01-01

    For the systemic management and easy using of teaching file in radiology department, the authors tried to do the setup of a database management system of teaching file using personal computer. We used a personal computer (IBM PC compatible, 486DX2) including a image capture card(Window vision, Dooin Elect, Seoul, Korea) and video camera recorder (8mm, CCD-TR105, Sony, Tokyo, Japan) for the acquisition and storage of images. We developed the database program by using Foxpro for Window 2.6(Microsoft, Seattle, USA) executed in the Window 3.1 (Microsoft, Seattle, USA). Each datum consisted of hospital number, name, sex, age, examination date, keyword, radiologic examination modalities, final diagnosis, radiologic findings, references and representative images. The images were acquired and stored as bitmap format (8 bitmap, 540 X 390 ∼ 545 X 414, 256 gray scale) and displayed on the 17 inch-flat monitor(1024 X 768, Samtron, Seoul, Korea). Without special devices, the images acquisition and storage could be done on the reading viewbox, simply. The image quality on the computer's monitor was less than the one of original film on the viewbox, but generally the characteristics of each lesions could be differentiated. Easy retrieval of data was possible for the purpose of teaching file system. Without high cost appliances, we could consummate the image database system of teaching file using personal computer with relatively inexpensive method

  7. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  8. A Computable OLG Model for Gender and Growth Policy Analysis

    OpenAIRE

    Pierre-Richard Agénor

    2012-01-01

    This paper develops a computable Overlapping Generations (OLG) model for gender and growth policy analysis. The model accounts for human and physical capital accumulation (both public and private), intra- and inter-generational health persistence, fertility choices, and women's time allocation between market work, child rearing, and home production. Bargaining between spouses and gender bias, in the form of discrimination in the work place and mothers' time allocation between daughters and so...

  9. A comparison of canal preparations by Mtwo and RaCe rotary files using full sequence versus one rotary file techniques; a cone-beam computed tomography analysis

    Directory of Open Access Journals (Sweden)

    Mohsen Aminsobhani

    2014-01-01

    Full Text Available Objectives: Using one rotary file can result in a faster canal preparation. This can be done with several file systems and endodontic motors. In the present study, a newly single file technique (one rotary file technique with available rotary file systems is introduced. The aim of the present study was to evaluate centering ability and remaining dentin thickness of 2 rotary nickel-titanium systems (Mtwo versus RaCe and instrumentation techniques (conventional versus one rotary file by cone-beam computed tomography. Materials and Methods: A total of 76 mandibular molar teeth were selected and divided to 4 groups (n = 19 teeth with 57 canals. The teeth were mounted in resin and pre-instrumentation scans were prepared by Cone Beam Computed Tomography (CBCT. The canals instrumented with Mtwo and RaCe rotary files either in conventional or one rotary file technique (ORF. After cleaning and shaping of distal and mesial canals, post instrumentation scans were performed by CBCT in the same position as pre instrumentation scans. Centering ability and remaining dentin thickness were evaluated by Planmeca Romexis viewer. The data were analyzed with analysis of variance and post hoc t test (P 0.05. However, in a few cross-sections, conventional technique and/or RaCe showed higher centering ability. One rotary file technique with either RaCe or Mtwo was significantly faster than conventional technique (P = 0.02. There was no significant difference among groups regarding file fracture. Mesiolingual canals showed more transportation compared with mesiobuccal and distal canals. Conclusions: Both of the instrumentation systems and techniques produced canal preparations with adequate centering ratio. One rotary file technique prepared canal significantly faster than conventional technique.

  10. A File Storage Service on a Cloud Computing Environment for Digital Libraries

    Directory of Open Access Journals (Sweden)

    Victor Jesus Sosa-Sosa

    2012-12-01

    Full Text Available This paper introduces a file storage service that is implemented on a private/hybrid cloud computing environment. The entire system was implemented using open source software. The characteristic of elasticity is supported by virtualization technologies allowing to increase and to decrease the computing and storage resources based on their demand. An evaluation of performance and resource consumption was made using several levels of data availability and fault tolerance. The set of modules included in this storage environment can be taken as a reference guide for IT staff that wants to have some experience building a modest cloud storage infrastructure.

  11. Do Your School Policies Provide Equal Access to Computers? Are You Sure?

    Science.gov (United States)

    DuBois, Phyllis A.; Schubert, Jane G.

    1986-01-01

    Outlines how school policies can unintentionally perpetuate gender discrimination in student computer use and access. Describes four areas of administrative policies that can cause inequities and provides ways for administrators to counteract these policies. Includes discussion of a program to balance computer use, and an abstract of an article…

  12. Evaluation of clinical data in childhood asthma. Application of a computer file system

    Energy Technology Data Exchange (ETDEWEB)

    Fife, D.; Twarog, F.J.; Geha, R.S.

    1983-10-01

    A computer file system was used in our pediatric allergy clinic to assess the value of chest roentgenograms and hemoglobin determinations used in the examination of patients and to correlate exposure to pets and forced hot air with the severity of asthma. Among 889 children with asthma, 20.7% had abnormal chest roentgenographic findings, excluding hyperinflation and peribronchial thickening, and 0.7% had abnormal hemoglobin values. Environmental exposure to pets or forced hot air was not associated with increased severity of asthma, as assessed by five measures of outcome: number of medications administered, requirement for corticosteroids, frequency of clinic visits, frequency of emergency room visits, and frequency of hospitalizations.

  13. Evaluation of clinical data in childhood asthma. Application of a computer file system

    International Nuclear Information System (INIS)

    Fife, D.; Twarog, F.J.; Geha, R.S.

    1983-01-01

    A computer file system was used in our pediatric allergy clinic to assess the value of chest roentgenograms and hemoglobin determinations used in the examination of patients and to correlate exposure to pets and forced hot air with the severity of asthma. Among 889 children with asthma, 20.7% had abnormal chest roentgenographic findings, excluding hyperinflation and peribronchial thickening, and 0.7% had abnormal hemoglobin values. Environmental exposure to pets or forced hot air was not associated with increased severity of asthma, as assessed by five measures of outcome: number of medications administered, requirement for corticosteroids, frequency of clinic visits, frequency of emergency room visits, and frequency of hospitalizations

  14. Adjusting the fairshare policy to prevent computing power loss

    Science.gov (United States)

    Dal Pra, Stefano

    2017-10-01

    On a typical WLCG site providing batch access to computing resources according to a fairshare policy, the idle time lapse after a job ends and before a new one begins on a given slot is negligible if compared to the duration of typical jobs. The overall amount of these intervals over a time window increases with the size of the cluster and the inverse of job duration and can be considered equivalent to an average number of unavailable slots over that time window. This value has been investigated for the Tier-1 at CNAF, and observed to occasionally grow and reach up to more than the 10% of the about 20,000 available computing slots. Analysis reveals that this happens when a sustained rate of short jobs is submitted to the cluster and dispatched by the batch system. Because of how the default fairshare policy works, it increases the dynamic priority of those users mostly submitting short jobs, since they are not accumulating runtime, and will dispatch more of their jobs at the next round, thus worsening the situation until the submission flow ends. To address this problem the default behaviour of the fairshare have been altered by adding a correcting term to the default formula for the dynamic priority. The LSF batch system, currently adopted at CNAF, provides a way to define its value by invoking a C function, which returns it for each user in the cluster. The correcting term works by rounding up to a minimum defined runtime the most recently done jobs. Doing so, each short job looks almost like a regular one and the dynamic priority value settles to a proper value. The net effect is a reduction of the dispatching rate of short jobs and, consequently, the average number of available slots greatly improves. Furthermore, a potential starvation problem, actually observed at least once is also prevented. After describing short jobs and reporting about their impact on the cluster, possible workarounds are discussed and the selected solution is motivated. Details on the

  15. Trust in social computing. The case of peer-to-peer file sharing networks

    Directory of Open Access Journals (Sweden)

    Heng Xu

    2011-09-01

    Full Text Available Social computing and online communities are changing the fundamental way people share information and communicate with each other. Social computing focuses on how users may have more autonomy to express their ideas and participate in social exchanges in various ways, one of which may be peer-to-peer (P2P file sharing. Given the greater risk of opportunistic behavior by malicious or criminal communities in P2P networks, it is crucial to understand the factors that affect individual’s use of P2P file sharing software. In this paper, we develop and empirically test a research model that includes trust beliefs and perceived risks as two major antecedent beliefs to the usage intention. Six trust antecedents are assessed including knowledge-based trust, cognitive trust, and both organizational and peer-network factors of institutional trust. Our preliminary results show general support for the model and offer some important implications for software vendors in P2P sharing industry and regulatory bodies.

  16. Public policy and regulatory implications for the implementation of Opportunistic Cloud Computing Services for Enterprises

    DEFF Research Database (Denmark)

    Kuada, Eric; Olesen, Henning; Henten, Anders

    2012-01-01

    Opportunistic Cloud Computing Services (OCCS) is a social network approach to the provisioning and management of cloud computing services for enterprises. This paper discusses how public policy and regulations will impact on OCCS implementation. We rely on documented publicly available government...... and corporate policies on the adoption of cloud computing services and deduce the impact of these policies on their adoption of opportunistic cloud computing services. We conclude that there are regulatory challenges on data protection that raises issues for cloud computing adoption in general; and the lack...... of a single globally accepted data protection standard poses some challenges for very successful implementation of OCCS for companies. However, the direction of current public and corporate policies on cloud computing make a good case for them to try out opportunistic cloud computing services....

  17. Computing Optimal Stationary Policies for Multi-objective Markov Decision Processes

    NARCIS (Netherlands)

    Wiering, M.A.; Jong, E.D. de

    2007-01-01

    This paper describes a novel algorithm called CONMODP for computing Pareto optimal policies for deterministic multi-objective sequential decision problems. CON-MODP is a value iteration based multi-objective dynamic programming algorithm that only computes stationary policies. We observe

  18. Request queues for interactive clients in a shared file system of a parallel computing system

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin

    2015-08-18

    Interactive requests are processed from users of log-in nodes. A metadata server node is provided for use in a file system shared by one or more interactive nodes and one or more batch nodes. The interactive nodes comprise interactive clients to execute interactive tasks and the batch nodes execute batch jobs for one or more batch clients. The metadata server node comprises a virtual machine monitor; an interactive client proxy to store metadata requests from the interactive clients in an interactive client queue; a batch client proxy to store metadata requests from the batch clients in a batch client queue; and a metadata server to store the metadata requests from the interactive client queue and the batch client queue in a metadata queue based on an allocation of resources by the virtual machine monitor. The metadata requests can be prioritized, for example, based on one or more of a predefined policy and predefined rules.

  19. Methods, systems, and computer program products for network firewall policy optimization

    Science.gov (United States)

    Fulp, Errin W [Winston-Salem, NC; Tarsa, Stephen J [Duxbury, MA

    2011-10-18

    Methods, systems, and computer program products for firewall policy optimization are disclosed. According to one method, a firewall policy including an ordered list of firewall rules is defined. For each rule, a probability indicating a likelihood of receiving a packet matching the rule is determined. The rules are sorted in order of non-increasing probability in a manner that preserves the firewall policy.

  20. Journal of Computer Science and Its Application: Editorial Policies

    African Journals Online (AJOL)

    Focus and Scope. The journal provides a multidisciplinary forum for the publication of original research and technical papers, short communications, state-of-art computing and review papers on advances, techniques, practice, and applications of Computer Science ...

  1. Modification to the Monte Carlo N-Particle (MCNP) Visual Editor (MCNPVised) to Read in Computer Aided Design (CAD) Files

    International Nuclear Information System (INIS)

    Randolph Schwarz; Leland L. Carter; Alysia Schwarz

    2005-01-01

    Monte Carlo N-Particle Transport Code (MCNP) is the code of choice for doing complex neutron/photon/electron transport calculations for the nuclear industry and research institutions. The Visual Editor for Monte Carlo N-Particle is internationally recognized as the best code for visually creating and graphically displaying input files for MCNP. The work performed in this grant was used to enhance the capabilities of the MCNP Visual Editor to allow it to read in both 2D and 3D Computer Aided Design (CAD) files, allowing the user to electronically generate a valid MCNP input geometry

  2. Mapping an Emergent Field of "Computational Education Policy": Policy Rationalities, Prediction and Data in the Age of Artificial Intelligence

    Science.gov (United States)

    Gulson, Kalervo N.; Webb, P. Taylor

    2017-01-01

    Contemporary education policy involves the integration of novel forms of data and the creation of new data platforms, in addition to the infusion of business principles into school governance networks, and intensification of socio-technical relations. In this paper, we examine how "computational rationality" may be understood as…

  3. The Impact of Fiscal Policy on Poverty in Ethiopia: A Computable ...

    African Journals Online (AJOL)

    Ethiopia has implemented various fiscal policy reforms in the past decade. Most of these reforms center on indirect taxes and pro-poor expenditure patterns. This study investigates the economy-wide impacts of these fiscal policy changes on poverty. To this effect, the study used a static computable general equilibrium ...

  4. A Policy Language for a Pervasive Computing Environment

    National Research Council Canada - National Science Library

    Kagal, Lalana; Finin, Tim; Joshi, Anupam

    2005-01-01

    .... The pervasive computing environments under consideration are those in which people and devices are mobile and use various wireless networking technologies to discover and access services and devices in their vicinity...

  5. Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

    National Research Council Canada - National Science Library

    Wilson, Clay

    2005-01-01

    Many international terrorist groups now actively use computers and the Internet to communicate, and several may develop or acquire the necessary technical skills to direct a coordinated attack against...

  6. File Sharing, Napster, and Institutional Responses: Educative, Developmental, or Responsive Policy?

    Science.gov (United States)

    Lane, Jason E.; Healy, Margaret A.

    2005-01-01

    Student use of the Internet for such purposes as sharing and downloading illegal copies of music and movies presents new and complex challenges in the relationship between the institution and student. This article reviews the development of the file sharing phenomena; and through analysis of existing institutional responses, legal advice, media…

  7. The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing

    DEFF Research Database (Denmark)

    Pedersen, Michael Østergaard; Pagter, Jakob Illeborg

    2007-01-01

    In many application scenarios for pervasive computing, theft is a serious security threat. In this paper we present the All-Or-Nothing anti-theft policy aimed at providing theft protection for pervasive computing. The overall idea behind the All-Or-Nothing anti-theft policy is to chain devices...... together in friendly networks so that any device will only work when it can see all of its friends. Thus a thief will have to keep the network of friendly devices together even if he only desires to steal one of the devices. Otherwise the device will not work. We provide a detailed security policy, present...... the required cryptographic protocols, provide three different applications, and finally we document that the policy is suitable for implementation on typical pervasive computing devices....

  8. CERN’s Computing rules updated to include policy for control systems

    CERN Document Server

    IT Department

    2008-01-01

    The use of CERN’s computing facilities is governed by rules defined in Operational Circular No. 5 and its subsidiary rules of use. These rules are available from the web site http://cern.ch/ComputingRules. Please note that the subsidiary rules for Internet/Network use have been updated to include a requirement that control systems comply with the CNIC(Computing and Network Infrastructure for Control) Security Policy. The security policy for control systems, which was approved earlier this year, can be accessed at https://edms.cern.ch/document/584092 IT Department

  9. Telecommunications Policy Research Conference. Computer and Communications Security Section. Papers.

    Science.gov (United States)

    Telecommunications Policy Research Conference, Inc., Washington, DC.

    In his paper, "European Needs and Attitudes towards Information Security," Richard I. Polis notes that the needs for security in computer systems, telecommunications, and media are rather uniform throughout Western Europe, and are seen as being significantly different from the needs in the United States. Recognition of these needs is,…

  10. "Life" and Education Policy: Intervention, Augmentation and Computation

    Science.gov (United States)

    Gulson, Kalervo N.; Webb, P. Taylor

    2018-01-01

    In this paper, we are interested in the notion of multiple ways of thinking, knowing and transforming life, namely an increasing capacity to intervene in "life" as a "molecular biopolitics," and the changing ways in which "life" can be understood computationally. We identify and speculate on the ways different ideas…

  11. Geothermal-energy files in computer storage: sites, cities, and industries

    Energy Technology Data Exchange (ETDEWEB)

    O' Dea, P.L.

    1981-12-01

    The site, city, and industrial files are described. The data presented are from the hydrothermal site file containing about three thousand records which describe some of the principal physical features of hydrothermal resources in the United States. Data elements include: latitude, longitude, township, range, section, surface temperature, subsurface temperature, the field potential, and well depth for commercialization. (MHR)

  12. Generation of Gaussian 09 Input Files for the Computation of 1H and 13C NMR Chemical Shifts of Structures from a Spartan’14 Conformational Search

    OpenAIRE

    sprotocols

    2014-01-01

    Authors: Spencer Reisbick & Patrick Willoughby ### Abstract This protocol describes an approach to preparing a series of Gaussian 09 computational input files for an ensemble of conformers generated in Spartan’14. The resulting input files are necessary for computing optimum geometries, relative conformer energies, and NMR shielding tensors using Gaussian. Using the conformational search feature within Spartan’14, an ensemble of conformational isomers was obtained. To convert the str...

  13. Discharge Fee Policy Analysis: A Computable General Equilibrium (CGE) Model of Water Resources and Water Environments

    OpenAIRE

    Guohua Fang; Ting Wang; Xinyi Si; Xin Wen; Yu Liu

    2016-01-01

    To alleviate increasingly serious water pollution and shortages in developing countries, various kinds of policies have been implemented by local governments. It is vital to quantify and evaluate the performance and potential economic impacts of these policies. This study develops a Computable General Equilibrium (CGE) model to simulate the regional economic and environmental effects of discharge fees. Firstly, water resources and water environment factors are separated from the input and out...

  14. Computational system to create an entry file for replicating I-125 seeds simulating brachytherapy case studies using the MCNPX code

    Directory of Open Access Journals (Sweden)

    Leonardo da Silva Boia

    2014-03-01

    Full Text Available Purpose: A computational system was developed for this paper in the C++ programming language, to create a 125I radioactive seed entry file, based on the positioning of a virtual grid (template in voxel geometries, with the purpose of performing prostate cancer treatment simulations using the MCNPX code.Methods: The system is fed with information from the planning system with regard to each seed’s location and its depth, and an entry file is automatically created with all the cards (instructions for each seed regarding their cell blocks and surfaces spread out spatially in the 3D environment. The system provides with precision a reproduction of the clinical scenario for the MCNPX code’s simulation environment, thereby allowing the technique’s in-depth study.Results and Conclusion: The preliminary results from this study showed that the lateral penumbra of uniform scanning proton beams was less sensitive In order to validate the computational system, an entry file was created with 88 125I seeds that were inserted in the phantom’s MAX06 prostate region with initial activity determined for the seeds at the 0.27 mCi value. Isodose curves were obtained in all the prostate slices in 5 mm steps in the 7 to 10 cm interval, totaling 7 slices. Variance reduction techniques were applied in order to optimize computational time and the reduction of uncertainties such as photon and electron energy interruptions in 4 keV and forced collisions regarding cells of interest. Through the acquisition of isodose curves, the results obtained show that hot spots have values above 300 Gy, as anticipated in literature, stressing the importance of the sources’ correct positioning, in which the computational system developed provides, in order not to release excessive doses in adjacent risk organs. The 144 Gy prescription curve showed in the validation process that it covers perfectly a large percentage of the volume, at the same time that it demonstrates a large

  15. OK, Computer: File Sharing, the Music Industry, and Why We Need the Pirate Party

    Directory of Open Access Journals (Sweden)

    Adrian Cosstick

    2009-03-01

    Full Text Available The Pirate Party believes the state and big business are in the process of protecting stale and inefficient models of business for their own monetary benefit by limiting our right to share information. The Pirate Party suggests that they are achieving this goal through the amendment of intellectual property legislation. In the dawn of the digital era, the Pirate Party advocates that governments and multinational corporations are using intellectual property to: crack down on file sharing which limits the ability to share knowledge and information; increase the terms and length of copyright to raise profits; and build code into music files which limits their ability to be shared (Pirate Party, 2009. There are a number of ‘copyright industries’ that are affected by these issues, none more so than the music industry. Its relationship with file sharing is topical and makes an excellent case study to address the impact big business has had on intellectual property and the need for the Pirate Party’s legislative input. The essay will then examine the central issues raised by illegal file sharing. In particular, the future for record companies in an environment that increasingly demands flexibility, and whether the Pirate Party’s proposal is a viable solution to the music industry’s problems

  16. Population-based learning of load balancing policies for a distributed computer system

    Science.gov (United States)

    Mehra, Pankaj; Wah, Benjamin W.

    1993-01-01

    Effective load-balancing policies use dynamic resource information to schedule tasks in a distributed computer system. We present a novel method for automatically learning such policies. At each site in our system, we use a comparator neural network to predict the relative speedup of an incoming task using only the resource-utilization patterns obtained prior to the task's arrival. Outputs of these comparator networks are broadcast periodically over the distributed system, and the resource schedulers at each site use these values to determine the best site for executing an incoming task. The delays incurred in propagating workload information and tasks from one site to another, as well as the dynamic and unpredictable nature of workloads in multiprogrammed multiprocessors, may cause the workload pattern at the time of execution to differ from patterns prevailing at the times of load-index computation and decision making. Our load-balancing policy accommodates this uncertainty by using certain tunable parameters. We present a population-based machine-learning algorithm that adjusts these parameters in order to achieve high average speedups with respect to local execution. Our results show that our load-balancing policy, when combined with the comparator neural network for workload characterization, is effective in exploiting idle resources in a distributed computer system.

  17. Essays on environmental policy analysis: Computable general equilibrium approaches applied to Sweden

    International Nuclear Information System (INIS)

    Hill, M.

    2001-01-01

    This thesis consists of three essays within the field of applied environmental economics, with the common basic aim of analyzing effects of Swedish environmental policy. Starting out from Swedish environmental goals, the thesis assesses a range of policy-related questions. The objective is to quantify policy outcomes by constructing and applying numerical models especially designed for environmental policy analysis. Static and dynamic multi-sectoral computable general equilibrium models are developed in order to analyze the following issues. The costs and benefits of a domestic carbon dioxide (CO 2 ) tax reform. Special attention is given to how these costs and benefits depend on the structure of the tax system and, furthermore, how they depend on policy-induced changes in 'secondary' pollutants. The effects of allowing for emission permit trading through time when the domestic long-term domestic environmental goal is specified in CO 2 stock terms. The effects on long-term projected economic growth and welfare that are due to damages from emission flow and accumulation of 'local' pollutants (nitrogen oxides and sulfur dioxide), as well as the outcome of environmental policy when costs and benefits are considered in an integrated environmental-economic framework

  18. Government Cloud Computing Policies: Potential Opportunities for Advancing Military Biomedical Research.

    Science.gov (United States)

    Lebeda, Frank J; Zalatoris, Jeffrey J; Scheerer, Julia B

    2018-02-07

    This position paper summarizes the development and the present status of Department of Defense (DoD) and other government policies and guidances regarding cloud computing services. Due to the heterogeneous and growing biomedical big datasets, cloud computing services offer an opportunity to mitigate the associated storage and analysis requirements. Having on-demand network access to a shared pool of flexible computing resources creates a consolidated system that should reduce potential duplications of effort in military biomedical research. Interactive, online literature searches were performed with Google, at the Defense Technical Information Center, and at two National Institutes of Health research portfolio information sites. References cited within some of the collected documents also served as literature resources. We gathered, selected, and reviewed DoD and other government cloud computing policies and guidances published from 2009 to 2017. These policies were intended to consolidate computer resources within the government and reduce costs by decreasing the number of federal data centers and by migrating electronic data to cloud systems. Initial White House Office of Management and Budget information technology guidelines were developed for cloud usage, followed by policies and other documents from the DoD, the Defense Health Agency, and the Armed Services. Security standards from the National Institute of Standards and Technology, the Government Services Administration, the DoD, and the Army were also developed. Government Services Administration and DoD Inspectors General monitored cloud usage by the DoD. A 2016 Government Accountability Office report characterized cloud computing as being economical, flexible and fast. A congressionally mandated independent study reported that the DoD was active in offering a wide selection of commercial cloud services in addition to its milCloud system. Our findings from the Department of Health and Human Services

  19. Health adaptation policy for climate vulnerable groups: a 'critical computational linguistics' analysis.

    Science.gov (United States)

    Seidel, Bastian M; Bell, Erica

    2014-11-28

    Many countries are developing or reviewing national adaptation policy for climate change but the extent to which these meet the health needs of vulnerable groups has not been assessed. This study examines the adequacy of such policies for nine known climate-vulnerable groups: people with mental health conditions, Aboriginal people, culturally and linguistically diverse groups, aged people, people with disabilities, rural communities, children, women, and socioeconomically disadvantaged people. The study analyses an exhaustive sample of national adaptation policy documents from Annex 1 ('developed') countries of the United Nations Framework Convention on Climate Change: 20 documents from 12 countries. A 'critical computational linguistics' method was used involving novel software-driven quantitative mapping and traditional critical discourse analysis. The study finds that references to vulnerable groups are relatively little present or non-existent, as well as poorly connected to language about practical strategies and socio-economic contexts, both also little present. The conclusions offer strategies for developing policy that is better informed by a 'social determinants of health' definition of climate vulnerability, consistent with best practice in the literature and global policy prescriptions.

  20. Dimensional quality control of Ti-Ni dental file by optical coordinate metrology and computed tomography

    DEFF Research Database (Denmark)

    Yagüe-Fabra, J.A.; Tosello, Guido; Ontiveros, S.

    2014-01-01

    techniques. However, the establishment of CT systems traceability when measuring 3D complex geometries is still an open issue. In this work, to verify the quality of the CT dimensional measurements, the dental file has been measured both with a μCT system and an optical CMM (OCMM). The uncertainty...... of measurements performed with both technologies is assessed. The estimated uncertainty is eventually compared with the component’s calibration and tolerances to validate the measuring capability of the μCT system....

  1. 78 FR 63177 - Order on Voluntary Remand and Clarifying Policy on Filing of Reactive Power Service Rate...

    Science.gov (United States)

    2013-10-23

    ... the obligation to follow a voltage schedule.'' \\19\\ The Commission distinguished Hot Spring Power Co..., to explore the mechanics of public utilities filing reactive power rate schedules for which there is...'' jurisdictional service and, accordingly, must be filed for Commission review); Sulphur Springs Valley Elec. Coop...

  2. Comp Plan: A computer program to generate dose and radiobiological metrics from dose-volume histogram files.

    Science.gov (United States)

    Holloway, Lois Charlotte; Miller, Julie-Anne; Kumar, Shivani; Whelan, Brendan M; Vinod, Shalini K

    2012-01-01

    Treatment planning studies often require the calculation of a large number of dose and radiobiological metrics. To streamline these calculations, a computer program called Comp Plan was developed using MATLAB. Comp Plan calculates common metrics, including equivalent uniform dose, tumor control probability, and normal tissue complication probability from dose-volume histogram data. The dose and radiobiological metrics can be calculated for the original data or for an adjusted fraction size using the linear quadratic model. A homogeneous boost dose can be added to a given structure if desired. The final output is written to an Excel file in a format convenient for further statistical analysis. Comp Plan was verified by independent calculations. A lung treatment planning study comparing 45 plans for 7 structures using up to 6 metrics for each structure was successfully analyzed within approximately 5 minutes with Comp Plan. The code is freely available from the authors on request. Crown Copyright © 2012. Published by Elsevier Inc. All rights reserved.

  3. Computation of a near-optimal service policy for a single-server queue with homogeneous jobs

    DEFF Research Database (Denmark)

    Johansen, Søren Glud; Larsen, Christian

    2001-01-01

    We present an algorithm for computing a near-optimal service policy for a single-server queueing system when the service cost is a convex function of the service time. The policy has state-dependent service times, and it includes the options to remove jobs from the system and to let the server...... be off. The systems' semi-Markov decision model has infinite action sets for the positive states. We design a new tailor-made policy-iteration algorithm for computing a policy for which the long-run average cost is at most a positive tolerance above the minimum average cost. For any positive tolerance...... our algorithm computes the desired policy in a finite (and small) number of iterations. The number is five for the numerical example used in the paper to illustrate results obtained by the algorithm....

  4. Verification of data files of TREF-computer program; TREF-ohjelmiston ohjaustiedostojen soveltuvuustutkimus

    Energy Technology Data Exchange (ETDEWEB)

    Ruottu, S.; Halme, A.; Ruottu, A. [Einco Oy, Karhula (Finland)

    1996-12-01

    Originally the aim of Y43 project was to verify TREF data files for several different processes. However, it appeared that deficient or missing coordination between experimental and theoretical works made meaningful verifications impossible in some cases. Therefore verification calculations were focused on catalytic cracking reactor which was developed by Neste. The studied reactor consisted of prefluidisation and reaction zones. Verification calculations concentrated mainly on physical phenomena like vaporization near oil injection zone. The main steps of the cracking process can be described as follows oil (liquid) -> oil (gas) -> oil (catal) -> product (catal) + char (catal) -> product (gas). Catalytic nature of cracking reaction was accounted by defining the cracking pseudoreaction into catalyst phase. This simplified reaction model was valid only for vaporization zone. Applied fluid dynamic theory was based on the results of EINCO`s earlier LIEKKI-projects. (author)

  5. COMPUTING

    CERN Multimedia

    M. Kasemann

    CCRC’08 challenges and CSA08 During the February campaign of the Common Computing readiness challenges (CCRC’08), the CMS computing team had achieved very good results. The link between the detector site and the Tier0 was tested by gradually increasing the number of parallel transfer streams well beyond the target. Tests covered the global robustness at the Tier0, processing a massive number of very large files and with a high writing speed to tapes.  Other tests covered the links between the different Tiers of the distributed infrastructure and the pre-staging and reprocessing capacity of the Tier1’s: response time, data transfer rate and success rate for Tape to Buffer staging of files kept exclusively on Tape were measured. In all cases, coordination with the sites was efficient and no serious problem was found. These successful preparations prepared the ground for the second phase of the CCRC’08 campaign, in May. The Computing Software and Analysis challen...

  6. Computation of a near-optimal service policy for a single-server queue with homogeneous jobs

    DEFF Research Database (Denmark)

    Johansen, Søren Glud; Larsen, Christian

    2000-01-01

    We present an algorithm for computing a near optimal service policy for a single-server queueing system when the service cost is a convex function of the service time. The policy has state-dependent service times, and it includes the options to remove jobs from the system and to let the server...

  7. Computation of a near-optimal service policy for a single-server queue with homogeneous jobs

    DEFF Research Database (Denmark)

    Johansen, Søren Glud; Larsen, Christian

    2001-01-01

    We present an algorithm for computing a near-optimal service policy for a single-server queueing system when the service cost is a convex function of the service time. The policy has state-dependent service times, and it includes the options to remove jobs from the system and to let the server...

  8. PCF File Format.

    Energy Technology Data Exchange (ETDEWEB)

    Thoreson, Gregory G [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    PCF files are binary files designed to contain gamma spectra and neutron count rates from radiation sensors. It is the native format for the GAmma Detector Response and Analysis Software (GADRAS) package [1]. It can contain multiple spectra and information about each spectrum such as energy calibration. This document outlines the format of the file that would allow one to write a computer program to parse and write such files.

  9. Computable general equilibrium modelling in the context of trade and environmental policy

    International Nuclear Information System (INIS)

    Koesler, Simon Tobias

    2014-01-01

    This thesis is dedicated to the evaluation of environmental policies in the context of climate change. Its objectives are twofold. Its first part is devoted to the development of potent instruments for quantitative impact analysis of environmental policy. In this context, the main contributions include the development of a new computable general equilibrium (CGE) model which makes use of the new comprehensive and coherent World Input-Output Dataset (WIOD) and which features a detailed representation of bilateral and bisectoral trade flows. Moreover it features an investigation of input substitutability to provide modellers with adequate estimates for key elasticities as well as a discussion and amelioration of the standard base year calibration procedure of most CGE models. Building on these tools, the second part applies the improved modelling framework and studies the economic implications of environmental policy. This includes an analysis of so called rebound effects, which are triggered by energy efficiency improvements and reduce their net benefit, an investigation of how firms restructure their production processes in the presence of carbon pricing mechanisms, and an analysis of a regional maritime emission trading scheme as one of the possible options to reduce emissions of international shipping in the EU context.

  10. Cone-beam Computed Tomographic Assessment of Canal Centering Ability and Transportation after Preparation with Twisted File and Bio RaCe Instrumentation.

    Directory of Open Access Journals (Sweden)

    Kiamars Honardar

    2014-08-01

    Full Text Available Use of rotary Nickel-Titanium (NiTi instruments for endodontic preparation has introduced a new era in endodontic practice, but this issue has undergone dramatic modifications in order to achieve improved shaping abilities. Cone-beam computed tomography (CBCT has made it possible to accurately evaluate geometrical changes following canal preparation. This study was carried out to compare canal centering ability and transportation of Twisted File and BioRaCe rotary systems by means of cone-beam computed tomography.Thirty root canals from freshly extracted mandibular and maxillary teeth were selected. Teeth were mounted and scanned before and after preparation by CBCT at different apical levels. Specimens were divided into 2 groups of 15. In the first group Twisted File and in the second, BioRaCe was used for canal preparation. Canal transportation and centering ability after preparation were assessed by NNT Viewer and Photoshop CS4 software. Statistical analysis was performed using t-test and two-way ANOVA.All samples showed deviations from the original axes of the canals. No significant differences were detected between the two rotary NiTi instruments for canal centering ability in all sections. Regarding canal transportation however, a significant difference was seen in the BioRaCe group at 7.5mm from the apex.Under the conditions of this in vitro study, Twisted File and BioRaCe rotary NiTi files retained original canal geometry.

  11. Shaping ability of ProTaper Gold and ProTaper Universal files by using cone-beam computed tomography

    Directory of Open Access Journals (Sweden)

    Amr M Elnaghy

    2016-01-01

    Full Text Available Context: This study evaluated and compared the shaping ability of ProTaper Gold (PG (PG; Dentsply, Tulsa Dental Specialties, Tulsa, OK, USA system with ProTaper Universal (PU (PU; Dentsply Maillefer, Ballaigues, Switzerland using cone-beam computed tomography (CBCT imaging. Materials and Methods: Forty mesiobuccal canals of mandibular first molars with curvatures of 25−30° were divided into two experimental groups (n = 20 according to the rotary nickel-titanium (NiTi file system used in canal instrumentation as follows: Group PG and group PU. Canals were scanned before and after instrumentation using CBCT scanner to evaluate root canal transportation and centering ratio at 3, 5, and 7 mm from the apex and volumetric changes. Data were statistically analyzed using independent t-tests and the significance level was set at P 0.05. Conclusions: The PG and PU NiTi rotary systems showed similar root canal shaping abilities in the preparation of mesial canals of mandibular first molars.

  12. Dynamic virtual machine allocation policy in cloud computing complying with service level agreement using CloudSim

    Science.gov (United States)

    Aneri, Parikh; Sumathy, S.

    2017-11-01

    Cloud computing provides services over the internet and provides application resources and data to the users based on their demand. Base of the Cloud Computing is consumer provider model. Cloud provider provides resources which consumer can access using cloud computing model in order to build their application based on their demand. Cloud data center is a bulk of resources on shared pool architecture for cloud user to access. Virtualization is the heart of the Cloud computing model, it provides virtual machine as per application specific configuration and those applications are free to choose their own configuration. On one hand, there is huge number of resources and on other hand it has to serve huge number of requests effectively. Therefore, resource allocation policy and scheduling policy play very important role in allocation and managing resources in this cloud computing model. This paper proposes the load balancing policy using Hungarian algorithm. Hungarian Algorithm provides dynamic load balancing policy with a monitor component. Monitor component helps to increase cloud resource utilization by managing the Hungarian algorithm by monitoring its state and altering its state based on artificial intelligent. CloudSim used in this proposal is an extensible toolkit and it simulates cloud computing environment.

  13. Computational and Statistical Models: A Comparison for Policy Modeling of Childhood Obesity

    Science.gov (United States)

    Mabry, Patricia L.; Hammond, Ross; Ip, Edward Hak-Sing; Huang, Terry T.-K.

    As systems science methodologies have begun to emerge as a set of innovative approaches to address complex problems in behavioral, social science, and public health research, some apparent conflicts with traditional statistical methodologies for public health have arisen. Computational modeling is an approach set in context that integrates diverse sources of data to test the plausibility of working hypotheses and to elicit novel ones. Statistical models are reductionist approaches geared towards proving the null hypothesis. While these two approaches may seem contrary to each other, we propose that they are in fact complementary and can be used jointly to advance solutions to complex problems. Outputs from statistical models can be fed into computational models, and outputs from computational models can lead to further empirical data collection and statistical models. Together, this presents an iterative process that refines the models and contributes to a greater understanding of the problem and its potential solutions. The purpose of this panel is to foster communication and understanding between statistical and computational modelers. Our goal is to shed light on the differences between the approaches and convey what kinds of research inquiries each one is best for addressing and how they can serve complementary (and synergistic) roles in the research process, to mutual benefit. For each approach the panel will cover the relevant "assumptions" and how the differences in what is assumed can foster misunderstandings. The interpretations of the results from each approach will be compared and contrasted and the limitations for each approach will be delineated. We will use illustrative examples from CompMod, the Comparative Modeling Network for Childhood Obesity Policy. The panel will also incorporate interactive discussions with the audience on the issues raised here.

  14. The Development of Computer Policies in Government, Political Parties, and Trade Unions in Norway 1961-1983

    Science.gov (United States)

    Elgsaas, Knut; Hegna, Håvard

    A “Council for Government Electronic Data Processing” was established in 1961. This was the start of development of a common policy for computers and data within the public administration. In 1969-70, computers got on the agenda of political parties and the trade unions. In the course of the seventies and the beginning of the eighties the government, the political parties, and the trade unions established a more comprehensive view of data political questions that we will designate by the term data policy. This paper puts some light on the causes and forces that drove the evolvement of a data policy within these central sectors in Norway. We will also show how various actors of research, trade and industry, and political life influenced the development of data policy and present links between the actors that indicate that they mutually influenced each other.

  15. Discharge Fee Policy Analysis: A Computable General Equilibrium (CGE Model of Water Resources and Water Environments

    Directory of Open Access Journals (Sweden)

    Guohua Fang

    2016-09-01

    Full Text Available To alleviate increasingly serious water pollution and shortages in developing countries, various kinds of policies have been implemented by local governments. It is vital to quantify and evaluate the performance and potential economic impacts of these policies. This study develops a Computable General Equilibrium (CGE model to simulate the regional economic and environmental effects of discharge fees. Firstly, water resources and water environment factors are separated from the input and output sources of the National Economic Production Department. Secondly, an extended Social Accounting Matrix (SAM of Jiangsu province is developed to simulate various scenarios. By changing values of the discharge fees (increased by 50%, 100% and 150%, three scenarios are simulated to examine their influence on the overall economy and each industry. The simulation results show that an increased fee will have a negative impact on Gross Domestic Product (GDP. However, waste water may be effectively controlled. Also, this study demonstrates that along with the economic costs, the increase of the discharge fee will lead to the upgrading of industrial structures from a situation of heavy pollution to one of light pollution which is beneficial to the sustainable development of the economy and the protection of the environment.

  16. An evaluation of screening policies for cervical cancer in England and Wales using a computer simulation model.

    OpenAIRE

    Parkin, D M; Moss, S M

    1986-01-01

    Several screening policies have been recommended for implementation in England and Wales in the last 20 years, although no evidence as to their relative effectiveness or efficiency has been provided. Using a computer simulation model, the outcomes expected from those policies had they been implemented over a 30 year period (1961-90) have been examined. The original policies based on five-yearly testing of women aged over 35 appear to be the most cost-effective, and extension of screening to y...

  17. Comprehensive optimisation of China’s energy prices, taxes and subsidy policies based on the dynamic computable general equilibrium model

    International Nuclear Information System (INIS)

    He, Y.X.; Liu, Y.Y.; Du, M.; Zhang, J.X.; Pang, Y.X.

    2015-01-01

    Highlights: • Energy policy is defined as a complication of energy price, tax and subsidy policies. • The maximisation of total social benefit is the optimised objective. • A more rational carbon tax ranges from 10 to 20 Yuan/ton under the current situation. • The optimal coefficient pricing is more conducive to maximise total social benefit. - Abstract: Under the condition of increasingly serious environmental pollution, rational energy policy plays an important role in the practical significance of energy conservation and emission reduction. This paper defines energy policies as the compilation of energy prices, taxes and subsidy policies. Moreover, it establishes the optimisation model of China’s energy policy based on the dynamic computable general equilibrium model, which maximises the total social benefit, in order to explore the comprehensive influences of a carbon tax, the sales pricing mechanism and the renewable energy fund policy. The results show that when the change rates of gross domestic product and consumer price index are ±2%, ±5% and the renewable energy supply structure ratio is 7%, the more reasonable carbon tax ranges from 10 to 20 Yuan/ton, and the optimal coefficient pricing mechanism is more conducive to the objective of maximising the total social benefit. From the perspective of optimising the overall energy policies, if the upper limit of change rate in consumer price index is 2.2%, the existing renewable energy fund should be improved

  18. A Centralized Control and Dynamic Dispatch Architecture for File Integrity Analysis

    Directory of Open Access Journals (Sweden)

    Ronald DeMara

    2006-02-01

    Full Text Available The ability to monitor computer file systems for unauthorized changes is a powerful administrative tool. Ideally this task could be performed remotely under the direction of the administrator to allow on-demand checking, and use of tailorable reporting and exception policies targeted to adjustable groups of network elements. This paper introduces M-FICA, a Mobile File Integrity and Consistency Analyzer as a prototype to achieve this capability using mobile agents. The M-FICA file tampering detection approach uses MD5 message digests to identify file changes. Two agent types, Initiator and Examiner, are used to perform file integrity tasks. An Initiator travels to client systems, computes a file digest, then stores those digests in a database file located on write-once media. An Examiner agent computes a new digest to compare with the original digests in the database file. Changes in digest values indicate that the file contents have been modified. The design and evaluation results for a prototype developed in the Concordia agent framework are described.

  19. Balancing Exploration, Uncertainty Representation and Computational Time in Many-Objective Reservoir Policy Optimization

    Science.gov (United States)

    Zatarain-Salazar, J.; Reed, P. M.; Quinn, J.; Giuliani, M.; Castelletti, A.

    2016-12-01

    As we confront the challenges of managing river basin systems with a large number of reservoirs and increasingly uncertain tradeoffs impacting their operations (due to, e.g. climate change, changing energy markets, population pressures, ecosystem services, etc.), evolutionary many-objective direct policy search (EMODPS) solution strategies will need to address the computational demands associated with simulating more uncertainties and therefore optimizing over increasingly noisy objective evaluations. Diagnostic assessments of state-of-the-art many-objective evolutionary algorithms (MOEAs) to support EMODPS have highlighted that search time (or number of function evaluations) and auto-adaptive search are key features for successful optimization. Furthermore, auto-adaptive MOEA search operators are themselves sensitive to having a sufficient number of function evaluations to learn successful strategies for exploring complex spaces and for escaping from local optima when stagnation is detected. Fortunately, recent parallel developments allow coordinated runs that enhance auto-adaptive algorithmic learning and can handle scalable and reliable search with limited wall-clock time, but at the expense of the total number of function evaluations. In this study, we analyze this tradeoff between parallel coordination and depth of search using different parallelization schemes of the Multi-Master Borg on a many-objective stochastic control problem. We also consider the tradeoff between better representing uncertainty in the stochastic optimization, and simplifying this representation to shorten the function evaluation time and allow for greater search. Our analysis focuses on the Lower Susquehanna River Basin (LSRB) system where multiple competing objectives for hydropower production, urban water supply, recreation and environmental flows need to be balanced. Our results provide guidance for balancing exploration, uncertainty, and computational demands when using the EMODPS

  20. RISKIND: An enhanced computer code for National Environmental Policy Act transportation consequence analysis

    International Nuclear Information System (INIS)

    Biwer, B.M.; LePoire, D.J.; Chen, S.Y.

    1996-01-01

    The RISKIND computer program was developed for the analysis of radiological consequences and health risks to individuals and the collective population from exposures associated with the transportation of spent nuclear fuel (SNF) or other radioactive materials. The code is intended to provide scenario-specific analyses when evaluating alternatives for environmental assessment activities, including those for major federal actions involving radioactive material transport as required by the National Environmental Policy Act (NEPA). As such, rigorous procedures have been implemented to enhance the code's credibility and strenuous efforts have been made to enhance ease of use of the code. To increase the code's reliability and credibility, a new version of RISKIND was produced under a quality assurance plan that covered code development and testing, and a peer review process was conducted. During development of the new version, the flexibility and ease of use of RISKIND were enhanced through several major changes: (1) a Windows trademark point-and-click interface replaced the old DOS menu system, (2) the remaining model input parameters were added to the interface, (3) databases were updated, (4) the program output was revised, and (5) on-line help has been added. RISKIND has been well received by users and has been established as a key component in radiological transportation risk assessments through its acceptance by the U.S. Department of Energy community in recent environmental impact statements (EISs) and its continued use in the current preparation of several EISs

  1. A security-awareness virtual machine management scheme based on Chinese wall policy in cloud computing.

    Science.gov (United States)

    Yu, Si; Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min

    2014-01-01

    Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much.

  2. Computer Security: Coming soon, a pragmatic Data Protection Policy for an open Organisation

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Like any other organisation/employer, CERN holds confidential data, e.g. medical records, personnel files, files on harassment cases, NDAs & contracts, credit card information, and even unpublished scientific results. Unfortunately, our current methods of handling such documents are inadequate owing to a lack of clarity with regard to responsibilities and obligations.   So, from time to time, some documents have become public that should not have (such as the premature publication of videos about the 2012 “Higgs” announcement); some of us have accidentally leaked confidential information (such as passwords used to access accelerator and experiment control systems in 2011); other colleagues have lost their laptops or had them stolen (e.g. from a delegation on duty travel in 2013) along with the e-mails and private files saved on them. Fortunately, these times of inadvertent data loss and lack of clarity concerning our obligations should soon&a...

  3. Air Vehicles Division Computational Structural Analysis Facilities Policy and Guidelines for Users

    Science.gov (United States)

    2005-05-01

    hosts in your "network" if it is lost or corrupted . Once the .rhosts file is sorted out, it then becomes a fairly straightforward matter to...generic modelling steps to carry out a PAFEC analysis after performing the common steps in section 8.4 above. a) Either: (i) Open your favourite

  4. A micro-computed tomographic evaluation of dentinal microcrack alterations during root canal preparation using single-file Ni-Ti systems.

    Science.gov (United States)

    Li, Mei-Lin; Liao, Wei-Li; Cai, Hua-Xiong

    2018-01-01

    The aim of the present study was to evaluate the length of dentinal microcracks observed prior to and following root canal preparation with different single-file nickel-titanium (Ni-Ti) systems using micro-computed tomography (micro-CT) analysis. A total of 80 mesial roots of mandibular first molars presenting with type II Vertucci canal configurations were scanned at an isotropic resolution of 7.4 µm. The samples were randomly assigned into four groups (n=20 per group) according to the system used for root canal preparation, including the WaveOne (WO), OneShape (OS), Reciproc (RE) and control groups. A second micro-CT scan was conducted after the root canals were prepared with size 25 instruments. Pre- and postoperative cross-section images of the roots (n=237,760) were then screened to identify the lengths of the microcracks. The results indicated that the microcrack lengths were notably increased following root canal preparation (P<0.05). The alterations in microcrack length in the OS group were more significant compared with those in the WO, RE and control groups (P<0.05). In conclusion, the formation and development of dentinal microcracks may be associated with the movement caused by preparation rather than the taper of the files. Among the single-file Ni-Ti systems, WO and RE were not observed to cause notable microcracks, while the OS system resulted in evident microcracks.

  5. Towards Static Analysis of Policy-Based Self-adaptive Computing Systems

    DEFF Research Database (Denmark)

    Margheri, Andrea; Nielson, Hanne Riis; Nielson, Flemming

    2016-01-01

    and by dynamically introducing new actions to accomplish task-oriented goals. However, the runtime evaluation of policies and their effects on system components make the prediction of system behaviour challenging. In this paper, we introduce the construction of a flow graph that statically points out the policy...... evaluations that can take place at runtime and exploit it to analyse the effects of policy evaluations on the progress of system components....

  6. [Comparison of effectiveness and safety between Twisted File technique and ProTaper Universal rotary full sequence based on micro-computed tomography].

    Science.gov (United States)

    Chen, Xiao-bo; Chen, Chen; Liang, Yu-hong

    2016-02-18

    To evaluate the efficacy and security of two type of rotary nickel titanium system (Twisted File and ProTaper Universal) for root canal preparation based on micro-computed tomography(micro-CT). Twenty extracted molars (including 62 canals) were divided into two experimental groups and were respectively instrumented using Twisted File rotary nickel titanium system (TF) and ProTaper Universal rotary nickel titanium system (PU) to #25/0.08 following recommended protocol. Time for root canal instrumentation (accumulation of time for every single file) was recorded. The 0-3 mm root surface from apex was observed under an optical stereomicroscope at 25 × magnification. The presence of crack line was noted. The root canals were scanned with micro-CT before and after root canal preparation. Three-dimensional shape images of canals were reconstructed, calculated and evaluated. The amount of canal central transportation of the two groups was calculated and compared. The shorter preparation time [(0.53 ± 0.14) min] was observed in TF group, while the preparation time of PU group was (2.06 ± 0.39) min (Pvs. (0.097 ± 0.084) mm, P<0.05]. No instrument separation was observed in both the groups. Cracks were not found in both the groups either based in micro-CT images or observation under an optical stereomicroscope at 25 × magnification. Compared with ProTaper Universal, Twisted File took less time in root canal preparation and exhibited better shaping ability, and less canal transportation.

  7. The Benin Experience: How Computational Modeling can lead to Major Vaccine Policy Changes in Low and Middle Income Countries

    Science.gov (United States)

    Lee, Bruce Y.; Schreiber, Benjamin; Wateska, Angela R.; Connor, Diana L.; Dicko, Hamadou M.; Jaillard, Philippe; Mvundura, Mercy; Levin, Carol; Avella, Mélanie; Haidari, Leila A.; Brown, Shawn T.

    2015-01-01

    While scientific studies can show the need for vaccine policy or operations changes, translating scientific findings to action is a complex process that needs to be executed appropriately for change to occur. Our Benin experience provided key steps and lessons learned to help computational modeling inform and lead to major policy change. The key steps are: engagement of Ministry of Health, identifying in-country “champions,” directed and efficient data collection, defining a finite set of realistic scenarios, making the study methodology transparent, presenting the results in a clear manner, and facilitating decision-making and advocacy. Generating scientific evidence is one component of policy change. Enabling change requires orchestration of a coordinated set of steps that heavily involve key stakeholders, earn their confidence, and provide them with relevant information. Our Benin EVM+CCEM+HERMES Process led to a decision to enact major changes and could serve as a template for similar approaches in other countries. PMID:25900134

  8. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction The first data taking period of November produced a first scientific paper, and this is a very satisfactory step for Computing. It also gave the invaluable opportunity to learn and debrief from this first, intense period, and make the necessary adaptations. The alarm procedures between different groups (DAQ, Physics, T0 processing, Alignment/calibration, T1 and T2 communications) have been reinforced. A major effort has also been invested into remodeling and optimizing operator tasks in all activities in Computing, in parallel with the recruitment of new Cat A operators. The teams are being completed and by mid year the new tasks will have been assigned. CRB (Computing Resource Board) The Board met twice since last CMS week. In December it reviewed the experience of the November data-taking period and could measure the positive improvements made for the site readiness. It also reviewed the policy under which Tier-2 are associated with Physics Groups. Such associations are decided twice per ye...

  9. Flat Files - JSNP | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available switchLanguage; BLAST Search Image Search Home About Archive Update History Data ... Data file File name: jsnp_flat_files File URL: ftp://ftp.biosciencedbc.jp/archiv...his Database Database Description Download License Update History of This Database Site Policy | Contact Us Flat Files - JSNP | LSDB Archive ...

  10. Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress

    National Research Council Canada - National Science Library

    Wilson, Clay

    2003-01-01

    Persistent computer security vulnerabilities may expose U.S. critical infrastructure and government computer systems to possible cyber attack by terrorists, possibly affecting the economy or other areas of national security...

  11. Integrated Engineering Policy in the Branch of Computer Science and Automatization,

    Science.gov (United States)

    A short description is given of the position of Czechoslovakia in the region of automatization and computer production. Automatization and computer ... science problems in Czechoslovakia are given and data on the future development of third-generation computers in socialistic countries, are described. (Author)

  12. Code of Ethical Conduct for Computer-Using Educators: An ICCE Policy Statement.

    Science.gov (United States)

    Computing Teacher, 1987

    1987-01-01

    Prepared by the International Council for Computers in Education's Ethics and Equity Committee, this code of ethics for educators using computers covers nine main areas: curriculum issues, issues relating to computer access, privacy/confidentiality issues, teacher-related issues, student issues, the community, school organizational issues,…

  13. Long term file migration. Part I: file reference patterns

    International Nuclear Information System (INIS)

    Smith, A.J.

    1978-08-01

    In most large computer installations, files are moved between on-line disk and mass storage (tape, integrated mass storage device) either automatically by the system or specifically at the direction of the user. This is the first of two papers which study the selection of algorithms for the automatic migration of files between mass storage and disk. The use of the text editor data sets at the Stanford Linear Accelerator Center (SLAC) computer installation is examined through the analysis of thirteen months of file reference data. Most files are used very few times. Of those that are used sufficiently frequently that their reference patterns may be examined, about a third show declining rates of reference during their lifetime; of the remainder, very few (about 5%) show correlated interreference intervals, and interreference intervals (in days) appear to be more skewed than would occur with the Bernoulli process. Thus, about two-thirds of all sufficiently active files appear to be referenced as a renewal process with a skewed interreference distribution. A large number of other file reference statistics (file lifetimes, interference distributions, moments, means, number of uses/file, file sizes, file rates of reference, etc.) are computed and presented. The results are applied in the following paper to the development and comparative evaluation of file migration algorithms. 17 figures, 13 tables

  14. Tobacco Town: Computational Modeling of Policy Options to Reduce Tobacco Retailer Density.

    Science.gov (United States)

    Luke, Douglas A; Hammond, Ross A; Combs, Todd; Sorg, Amy; Kasman, Matt; Mack-Crane, Austen; Ribisl, Kurt M; Henriksen, Lisa

    2017-05-01

    To identify the behavioral mechanisms and effects of tobacco control policies designed to reduce tobacco retailer density. We developed the Tobacco Town agent-based simulation model to examine 4 types of retailer reduction policies: (1) random retailer reduction, (2) restriction by type of retailer, (3) limiting proximity of retailers to schools, and (4) limiting proximity of retailers to each other. The model examined the effects of these policies alone and in combination across 4 different types of towns, defined by 2 levels of population density (urban vs suburban) and 2 levels of income (higher vs lower). Model results indicated that reduction of retailer density has the potential to decrease accessibility of tobacco products by driving up search and purchase costs. Policy effects varied by town type: proximity policies worked better in dense, urban towns whereas retailer type and random retailer reduction worked better in less-dense, suburban settings. Comprehensive retailer density reduction policies have excellent potential to reduce the public health burden of tobacco use in communities.

  15. Evaluating the efficiency of divestiture policy in promoting competitiveness using an analytical method and agent-based computational economics

    Energy Technology Data Exchange (ETDEWEB)

    Rahimiyan, Morteza; Rajabi Mashhadi, Habib [Department of Electrical Engineering, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad (Iran)

    2010-03-15

    Choosing a desired policy for divestiture of dominant firms' generation assets has been a challenging task and open question for regulatory authority. To deal with this problem, in this paper, an analytical method and agent-based computational economics (ACE) approach are used for ex-ante analysis of divestiture policy in reducing market power. The analytical method is applied to solve a designed concentration boundary problem, even for situations where the cost data of generators are unknown. The concentration boundary problem is the problem of minimizing or maximizing market concentration subject to operation constraints of the electricity market. It is proved here that the market concentration corresponding to operation condition is certainly viable in an interval calculated by the analytical method. For situations where the cost function of generators is available, the ACE is used to model the electricity market. In ACE, each power producer's profit-maximization problem is solved by the computational approach of Q-learning. The power producer using the Q-learning method learns from past experiences to implicitly identify the market power, and find desired response in competing with the rivals. Both methods are applied in a multi-area power system and effects of different divestiture policies on market behavior are analyzed. (author)

  16. Evaluating the efficiency of divestiture policy in promoting competitiveness using an analytical method and agent-based computational economics

    International Nuclear Information System (INIS)

    Rahimiyan, Morteza; Rajabi Mashhadi, Habib

    2010-01-01

    Choosing a desired policy for divestiture of dominant firms' generation assets has been a challenging task and open question for regulatory authority. To deal with this problem, in this paper, an analytical method and agent-based computational economics (ACE) approach are used for ex-ante analysis of divestiture policy in reducing market power. The analytical method is applied to solve a designed concentration boundary problem, even for situations where the cost data of generators are unknown. The concentration boundary problem is the problem of minimizing or maximizing market concentration subject to operation constraints of the electricity market. It is proved here that the market concentration corresponding to operation condition is certainly viable in an interval calculated by the analytical method. For situations where the cost function of generators is available, the ACE is used to model the electricity market. In ACE, each power producer's profit-maximization problem is solved by the computational approach of Q-learning. The power producer using the Q-learning method learns from past experiences to implicitly identify the market power, and find desired response in competing with the rivals. Both methods are applied in a multi-area power system and effects of different divestiture policies on market behavior are analyzed. (author)

  17. States Move toward Computer Science Standards. Policy Update. Vol. 23, No. 17

    Science.gov (United States)

    Tilley-Coulson, Eve

    2016-01-01

    While educators and parents recognize computer science as a key skill for career readiness, only five states have adopted learning standards in this area. Tides are changing, however, as the Every Student Succeeds Act (ESSA) recognizes with its call on states to provide a "well-rounded education" for students, to include computer science…

  18. The School Library Vertical File.

    Science.gov (United States)

    Smallwood, Carol

    1990-01-01

    Discusses the maintenance of vertical files in the school library. Topics covered include circulation, weeding, using materials for special displays, acquiring materials, policies on advertising and controversial issues, cross-references, subject headings, introducing students to vertical files, beginning a collection, and preservation. (MES)

  19. Numerical computation of inventory policies, based on the EOQ/sigma-x value for order-point systems

    DEFF Research Database (Denmark)

    Alstrøm, Poul

    2001-01-01

    This paper examines the numerical computation of two control parameters, order size and order point in the well-known inventory control model, an (s,Q)system with a beta safety strategy. The aim of the paper is to show that the EOQ/sigma-x value is both sufficient for controlling the system...... and essential for the economic consequences of using approximations in computations of optimal policies. In view of the evidence from a number of studies showing that firms' use of statistical inventory control lags far behind academic interest in the area, this is also an important aspect. The determination...... of optimal values for the control variables - even in this very simple inventory control system - is a complex task, and therefore not suited to practical implementation, where one or more of the following issues are neglected: the interpendence of order size and order point, the difference between stock...

  20. Numerical computation of inventory policies, based on the EOQ/sigma-x value for order-point systems

    DEFF Research Database (Denmark)

    Alstrøm, Poul

    2000-01-01

    This paper examines the numerical computation of two control parameters, order size and order point in the well-known inventory control model, an (s,Q)system with a beta safety strategy. The aim of the paper is to show that the EOQ/sigma-x value is both sufficient for controlling the system...... and essential for the economic consequences of using approximations in computations of optimal policies. In view of the evidence from a number of studies showing that firms' use of statistical inventory control lags far behind academic interest in the area, this is also an important aspect. The determination...... of optimal values for the control variables - even in this very simple inventory control system - is a complex task, and therefore not suited to practical implementation, where one or more of the following issues are neglected: the interpendence of order size and order point, the difference between stock...

  1. A feasibility study of implementing a bring-your-own-computing-device policy

    OpenAIRE

    Carideo, Jeffrey W.; Walker, Timothy P.; Williams, Jason C.

    2013-01-01

    Approved for public release; distribution is unlimited. Our team conducted an information technology study on the feasibility of reduction of hardware and software procurement expenditures at the Naval Postgraduate School, Graduate School of Business and Public Policy (GSBPP). The objectives were to calculate the total cost of the GSBPPs current expenditures, develop alternative hardware and software procurement plans, and measure these costs against the alternative plan of implementing a ...

  2. Effect of a preauthorization policy on the utilization rate of after-hours emergency department neuroradiology computed tomography.

    Science.gov (United States)

    Dhanoa, Deljit; Rennie Burton, Kirsteen; Noël de Tilly, Lyne; Menezes, Ravi J

    2013-05-01

    To evaluate the impact of an emergency department (ED) automatic preauthorization policy on after-hours utilization of neuroradiology computed tomography (CT). All CT studies of the head with contrast facial bones, orbits, spine, and neck requested through the ED and performed between January 1, 2004, and December 31, 2010, were reviewed. The preauthorization policy was instituted on February 25, 2008. A control group of noncontrast CT head studies was used for comparison. Pre- and postpolicy implementation utilization rates were compared between the control group of noncontrast CT head studies and the study group neuroradiology CT studies. During the study period, 408,501 ED patient visits occurred and 20,703 neuroradiology CT studies were carried out. The pre- and postimplementation groups of noncontrast CT head scans totalled 7,474 and 6,094, respectively, whereas the pre- and postimplementation groups of all other neuroradiology CT studies totalled 3,833 and 3,302, respectively. The CT utilization between the two groups did not differ significantly: the noncontrast head group pre- and postpolicy implementation increased by 0.31 to 3.41%, whereas the utilization of all other neuroradiology CT studies increased by 0.22 to 1.84% (p value  =  0.061 for a difference between groups). Implementation of an automatic preauthorization policy for after-hours neuroradiology CT studies did not result in a statistically significant increase in CT utilization. This suggests that concerns regarding the negative effects of such policies may be unfounded, and further research in this area is warranted.

  3. Computing a constrained control policy for a single-server queueing system

    DEFF Research Database (Denmark)

    Larsen, Christian

    n different processing times. Hence, we must subdivide the infinite state space into n disjoint sets and for each set decide which processing time to use. We show how to derive a mathematical expression for the long-run average cost per time unit. We also present an algorithm to find the optimal......We consider a single-server queueing system designed to serve homogeneous jobs. The jobs arrive to the system after a Poisson process and all processing times are deterministic. There is a set-up cost for starting up production and a holding cost rate is incurred for each job present. Also......, there is a service cost per job, which is a convex function of the service time. The control policy specifies when the server is on or off. It also specifies the state-dependent processing times. In order to avoid a very detailed control policy (which could be hard to implement) we will only allow the server to use...

  4. POLICIES FOR GREEN COMPUTING AND E-WASTE - THE ROMANIAN CASE -

    Directory of Open Access Journals (Sweden)

    STEGAROIU CARINA

    2014-12-01

    Full Text Available Computers today are an integral part of individuals’ lives all around the world; but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment‐friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Romania and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Romania to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.

  5. Reassessing US Policy Toward Iran

    National Research Council Canada - National Science Library

    Russillo, Victor

    2003-01-01

    See attached file. The purpose of this paper is to review the importance of Iran to US national security interests, review past and current US policy toward Iran, outline options for future US Iran policy...

  6. In-vitro Assessing the Shaping Ability of Three Nickel-Titanium Rotary Single File Systems by Cone Beam Computed Tomography

    Directory of Open Access Journals (Sweden)

    Ali Imad Al-Asadi

    2018-02-01

    Full Text Available Aim of the study was to evaluate the canal transportation and centering ability of three nickel-titanium single file rotary systems by cone beam computed tomography (CBCT. Materials and methods: Thirty permanent maxillary first molar with a range of mesiobuccal canals curvature from 20-30 degree were selected and assigned into three groups (n=10, according to the biomechanical preparation system used: Hyflex EDM (HF, Reciproc blue (RB and OneShape (OS. The sampled were scanned by CBCT after being mounted on customized acrylic base and then rescanned after the instrumentation. Slices from the axial section were taken from both exposures at 3 mm, 6 mm and 9 mm from the root apex corresponding to the apical, middle, and coronal third respectively. Data were statistically analyzed using Kurskal-Wallis and Mann-Whitney U tests at the 5% confidence level. Results: The results showed that there were no significant differences at the apical and coronal third and a significant difference at the middle third regarding canal transportation. However, there was a significant difference at the apical third and no significant difference at the middle and coronal third regarding centering ratio. Conclusion: It was concluded that the three single rotary systems reported a degree in canal transportation and centric ratio but the Hyflex EDM reported the least one.

  7. Building a parallel file system simulator

    International Nuclear Information System (INIS)

    Molina-Estolano, E; Maltzahn, C; Brandt, S A; Bent, J

    2009-01-01

    Parallel file systems are gaining in popularity in high-end computing centers as well as commercial data centers. High-end computing systems are expected to scale exponentially and to pose new challenges to their storage scalability in terms of cost and power. To address these challenges scientists and file system designers will need a thorough understanding of the design space of parallel file systems. Yet there exist few systematic studies of parallel file system behavior at petabyte- and exabyte scale. An important reason is the significant cost of getting access to large-scale hardware to test parallel file systems. To contribute to this understanding we are building a parallel file system simulator that can simulate parallel file systems at very large scale. Our goal is to simulate petabyte-scale parallel file systems on a small cluster or even a single machine in reasonable time and fidelity. With this simulator, file system experts will be able to tune existing file systems for specific workloads, scientists and file system deployment engineers will be able to better communicate workload requirements, file system designers and researchers will be able to try out design alternatives and innovations at scale, and instructors will be able to study very large-scale parallel file system behavior in the class room. In this paper we describe our approach and provide preliminary results that are encouraging both in terms of fidelity and simulation scalability.

  8. Design and application of remote file management system

    International Nuclear Information System (INIS)

    Zhu Haijun; Liu Dekang; Shen liren

    2006-01-01

    File transfer protocol can help users transfer files between computers on internet. FTP can not fulfill the needs of users in special occasions, so it needs programmer define file transfer protocol himself based on users. The method or realization and application for user-defined file transfer protocol is introduced. (authors)

  9. Healthcare Policy Statement on the Utility of Coronary Computed Tomography for Evaluation of Cardiovascular Conditions and Preventive Healthcare: From the Health Policy Working Group of the Society of Cardiovascular Computed Tomography.

    Science.gov (United States)

    Slim, Ahmad M; Jerome, Scott; Blankstein, Ron; Weigold, Wm Guy; Patel, Amit R; Kalra, Dinesh K; Miller, Ryan; Branch, Kelley; Rabbat, Mark G; Hecht, Harvey; Nicol, Edward D; Villines, Todd C; Shaw, Leslee J

    The rising cost of healthcare is prompting numerous policy and advocacy discussions regarding strategies for constraining growth and creating a more efficient and effective healthcare system. Cardiovascular imaging is central to the care of patients at risk of, and living with, heart disease. Estimates are that utilization of cardiovascular imaging exceeds 20 million studies per year. The Society of Cardiovascular CT (SCCT), alongside Rush University Medical Center, and in collaboration with government agencies, regional payers, and industry healthcare experts met in November 2016 in Chicago, IL to evaluate obstacles and hurdles facing the cardiovascular imaging community and how they can contribute to efficacy while maintaining or even improving outcomes and quality. The summit incorporated inputs from payers, providers, and patients' perspectives, providing a platform for all voices to be heard, allowing for a constructive dialogue with potential solutions moving forward. This article outlines the proceedings from the summit, with a detailed review of past hurdles, current status, and potential solutions as we move forward in an ever-changing healthcare landscape. Copyright © 2017 Society of Cardiovascular Computed Tomography. All rights reserved.

  10. COMPUTING

    CERN Document Server

    M. Kasemann

    Overview In autumn the main focus was to process and handle CRAFT data and to perform the Summer08 MC production. The operational aspects were well covered by regular Computing Shifts, experts on duty and Computing Run Coordination. At the Computing Resource Board (CRB) in October a model to account for service work at Tier 2s was approved. The computing resources for 2009 were reviewed for presentation at the C-RRB. The quarterly resource monitoring is continuing. Facilities/Infrastructure operations Operations during CRAFT data taking ran fine. This proved to be a very valuable experience for T0 workflows and operations. The transfers of custodial data to most T1s went smoothly. A first round of reprocessing started at the Tier-1 centers end of November; it will take about two weeks. The Computing Shifts procedure was tested full scale during this period and proved to be very efficient: 30 Computing Shifts Persons (CSP) and 10 Computing Resources Coordinators (CRC). The shift program for the shut down w...

  11. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction CMS distributed computing system performed well during the 2011 start-up. The events in 2011 have more pile-up and are more complex than last year; this results in longer reconstruction times and harder events to simulate. Significant increases in computing capacity were delivered in April for all computing tiers, and the utilisation and load is close to the planning predictions. All computing centre tiers performed their expected functionalities. Heavy-Ion Programme The CMS Heavy-Ion Programme had a very strong showing at the Quark Matter conference. A large number of analyses were shown. The dedicated heavy-ion reconstruction facility at the Vanderbilt Tier-2 is still involved in some commissioning activities, but is available for processing and analysis. Facilities and Infrastructure Operations Facility and Infrastructure operations have been active with operations and several important deployment tasks. Facilities participated in the testing and deployment of WMAgent and WorkQueue+Request...

  12. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview During the past three months activities were focused on data operations, testing and re-enforcing shift and operational procedures for data production and transfer, MC production and on user support. Planning of the computing resources in view of the new LHC calendar in ongoing. Two new task forces were created for supporting the integration work: Site Commissioning, which develops tools helping distributed sites to monitor job and data workflows, and Analysis Support, collecting the user experience and feedback during analysis activities and developing tools to increase efficiency. The development plan for DMWM for 2009/2011 was developed at the beginning of the year, based on the requirements from the Physics, Computing and Offline groups (see Offline section). The Computing management meeting at FermiLab on February 19th and 20th was an excellent opportunity discussing the impact and for addressing issues and solutions to the main challenges facing CMS computing. The lack of manpower is particul...

  13. COMPUTING

    CERN Multimedia

    P. McBride

    The Computing Project is preparing for a busy year where the primary emphasis of the project moves towards steady operations. Following the very successful completion of Computing Software and Analysis challenge, CSA06, last fall, we have reorganized and established four groups in computing area: Commissioning, User Support, Facility/Infrastructure Operations and Data Operations. These groups work closely together with groups from the Offline Project in planning for data processing and operations. Monte Carlo production has continued since CSA06, with about 30M events produced each month to be used for HLT studies and physics validation. Monte Carlo production will continue throughout the year in the preparation of large samples for physics and detector studies ramping to 50 M events/month for CSA07. Commissioning of the full CMS computing system is a major goal for 2007. Site monitoring is an important commissioning component and work is ongoing to devise CMS specific tests to be included in Service Availa...

  14. 48 CFR 750.7109-1 - Filing requests.

    Science.gov (United States)

    2010-10-01

    ... CONTRACT MANAGEMENT EXTRAORDINARY CONTRACTUAL ACTIONS Extraordinary Contractual Actions To Protect Foreign Policy Interests of the United States 750.7109-1 Filing requests. Any person (hereinafter called the...

  15. Traces of the Book Vatican Policy in the Manuscript File of Ramón del Valle-Inclán

    Directory of Open Access Journals (Sweden)

    Amparo de Juan Bolufer

    2017-01-01

    Full Text Available In various interviews done in 1933 Valle-Inclán said he was preparing a book for the historic series El Ruedo Ibérico that would explore the influence of the Vatican in Spanish politics. This article seeks to examine the traces of this narrative plan that have been preserved in the manuscript file belonging to the Valle-Inclán Alsina family, because we know that the writer continued to work on this historical project until his death. After examining the indirect documentation located primarily in the periodical press which bears witness to the process of writing this never published story, we will describe the unknown plans of structure and the drafts of work that are part of this creation file and that allow us to perceive the plot lines as well as the fundamental features of characterization for the prominent protagonists in this incomplete project.

  16. The evidence-policy divide: a 'critical computational linguistics' approach to the language of 18 health agency CEOs from 9 countries.

    Science.gov (United States)

    Bell, Erica; Seidel, Bastian M

    2012-10-30

    There is an emerging body of literature suggesting that the evidence-practice divide in health policy is complex and multi-factorial but less is known about the processes by which health policy-makers use evidence and their views about the specific features of useful evidence. This study aimed to contribute to understandings of how the most influential health policy-makers view useful evidence, in ways that help explore and question how the evidence-policy divide is understood and what research might be supported to help overcome this divide. A purposeful sample of 18 national and state health agency CEOs from 9 countries was obtained. Participants were interviewed using open-ended questions that asked them to define specific features of useful evidence. The analysis involved two main approaches 1)quantitative mapping of interview transcripts using Bayesian-based computational linguistics software 2)qualitative critical discourse analysis to explore the nuances of language extracts so identified. The decision-making, conclusions-oriented world of policy-making is constructed separately, but not exclusively, by policy-makers from the world of research. Research is not so much devalued by them as described as too technical- yet at the same time not methodologically complex enough to engage with localised policy-making contexts. It is not that policy-makers are negative about academics or universities, it is that they struggle to find complexity-oriented methodologies for understanding their stakeholder communities and improving systems. They did not describe themselves as having a more positive role in solving this challenge than academics. These interviews do not support simplistic definitions of policy-makers and researchers as coming from two irreconcilable worlds. They suggest that qualitative and quantitative research is valued by policy-makers but that to be policy-relevant health research may need to focus on building complexity-oriented research methods for

  17. The evidence-policy divide: a ‘critical computational linguistics’ approach to the language of 18 health agency CEOs from 9 countries

    Directory of Open Access Journals (Sweden)

    Bell Erica

    2012-10-01

    Full Text Available Abstract Background There is an emerging body of literature suggesting that the evidence-practice divide in health policy is complex and multi-factorial but less is known about the processes by which health policy-makers use evidence and their views about the specific features of useful evidence. This study aimed to contribute to understandings of how the most influential health policy-makers view useful evidence, in ways that help explore and question how the evidence-policy divide is understood and what research might be supported to help overcome this divide. Methods A purposeful sample of 18 national and state health agency CEOs from 9 countries was obtained. Participants were interviewed using open-ended questions that asked them to define specific features of useful evidence. The analysis involved two main approaches 1quantitative mapping of interview transcripts using Bayesian-based computational linguistics software 2qualitative critical discourse analysis to explore the nuances of language extracts so identified. Results The decision-making, conclusions-oriented world of policy-making is constructed separately, but not exclusively, by policy-makers from the world of research. Research is not so much devalued by them as described as too technical— yet at the same time not methodologically complex enough to engage with localised policy-making contexts. It is not that policy-makers are negative about academics or universities, it is that they struggle to find complexity-oriented methodologies for understanding their stakeholder communities and improving systems. They did not describe themselves as having a more positive role in solving this challenge than academics. Conclusions These interviews do not support simplistic definitions of policy-makers and researchers as coming from two irreconcilable worlds. They suggest that qualitative and quantitative research is valued by policy-makers but that to be policy-relevant health research may

  18. Organization of data transfer from Sonix+ to the file server Nfserv-b

    International Nuclear Information System (INIS)

    Morkovnikov, I.A.; Kashunin, I.A.; Sukhomlinov, G.A.

    2014-01-01

    The work is dedicated to data storage creation and file transfer automation from control computer to the file server. The work contains a list of data storage hardware and software, a description of the file system organization and data security.

  19. Comparing ProFile Vortex to ProTaper Next for the efficacy of removal of root filling material: An ex vivo micro-computed tomography study

    Directory of Open Access Journals (Sweden)

    Emad AlShwaimi

    2018-01-01

    Conclusion: Our findings suggest that PV is as effective as PTN for removal of root canal filling material. Therefore, PV can be considered for use in endodontic retreatment, although more effective files or techniques are still required.

  20. COMPUTING

    CERN Multimedia

    I. Fisk

    2013-01-01

    Computing activity had ramped down after the completion of the reprocessing of the 2012 data and parked data, but is increasing with new simulation samples for analysis and upgrade studies. Much of the Computing effort is currently involved in activities to improve the computing system in preparation for 2015. Operations Office Since the beginning of 2013, the Computing Operations team successfully re-processed the 2012 data in record time, not only by using opportunistic resources like the San Diego Supercomputer Center which was accessible, to re-process the primary datasets HTMHT and MultiJet in Run2012D much earlier than planned. The Heavy-Ion data-taking period was successfully concluded in February collecting almost 500 T. Figure 3: Number of events per month (data) In LS1, our emphasis is to increase efficiency and flexibility of the infrastructure and operation. Computing Operations is working on separating disk and tape at the Tier-1 sites and the full implementation of the xrootd federation ...

  1. Evaluation of canal transportation and centering ability of K 3 (0.02% and K 3 (0.04% with hand K files in primary teeth using spiral computed tomography

    Directory of Open Access Journals (Sweden)

    Haridoss Selvakumar

    2014-01-01

    Full Text Available Background: One of the objectives of root canal preparation is to clean and shape the root canal system while maintaining the original configuration. Therefore, it is important to keep the instruments centered to provide a correct enlargement, without excessive weakening of the root structure. Aim: The aim of the study was to compare canal transportation and centering ability of K 3 (0.02% taper and K 3 (0.04% taper with stainless steel hand K files in primary teeth using a spiral computed tomography (SCT scan. Materials and Methods: A total of 75 extracted mandibular primary second molars was collected. Canals were divided randomly into three groups of 25 teeth each. Group I: K 3 files (0.02% taper, Group II: K 3 (0.04% taper, and Group III: Stainless steel hand K files. Three regions from apical, mid-root, and coronal levels of the canal were recorded. All the teeth were scanned before and after instrumentation by using SCT. Results: K 3 (0.02% taper showed less canal transportation and a better centering ratio than K 3 (0.04% taper and stainless steel hand K files. Statistical Analysis: The mean values were compared between different study groups and the P-value was calculated by using Kruskal-Wallis one-way ANOVA. The Mann-Whitney U-test followed by the Bonferroni correction method was employed to identify the significant groups at the 5% level. Conclusion: K 3 (0.02% taper shaped root canals without significant shaping errors when compared to K 3 (0.04% taper and stainless steel hand K files in primary teeth.

  2. 37 CFR 401.16 - Electronic filing.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Electronic filing. 401.16 Section 401.16 Patents, Trademarks, and Copyrights ASSISTANT SECRETARY FOR TECHNOLOGY POLICY, DEPARTMENT... GOVERNMENT GRANTS, CONTRACTS, AND COOPERATIVE AGREEMENTS § 401.16 Electronic filing. Unless otherwise...

  3. COMPUTING

    CERN Multimedia

    M. Kasemann P. McBride Edited by M-C. Sawley with contributions from: P. Kreuzer D. Bonacorsi S. Belforte F. Wuerthwein L. Bauerdick K. Lassila-Perini M-C. Sawley

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the comput...

  4. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion An activity that is still in progress is computing for the heavy-ion program. The heavy-ion events are collected without zero suppression, so the event size is much large at roughly 11 MB per event of RAW. The central collisions are more complex and...

  5. 77 FR 74839 - Combined Notice of Filings

    Science.gov (United States)

    2012-12-18

    ... Tejas Pipeline LLC. Description: Joint Petition of El Paso Marketing Company, L.L.C. and Kinder Morgan Tejas Pipeline LLC for Temporary Waiver of Capacity Release Regulations and Policies. Filed Date: 12/11...

  6. 12 CFR Appendix F to Part 360 - Customer File Structure

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Customer File Structure F Appendix F to Part... POLICY RESOLUTION AND RECEIVERSHIP RULES Pt. 360, App. F Appendix F to Part 360—Customer File Structure This is the structure of the data file to provide to the FDIC information related to each customer who...

  7. JNDC FP decay data file

    International Nuclear Information System (INIS)

    Yamamoto, Tohru; Akiyama, Masatsugu

    1981-02-01

    The decay data file for fission product nuclides (FP DECAY DATA FILE) has been prepared for summation calculation of the decay heat of fission products. The average energies released in β- and γ-transitions have been calculated with computer code PROFP. The calculated results and necessary information have been arranged in tabular form together with the estimated results for 470 nuclides of which decay data are not available experimentally. (author)

  8. COMPUTING

    CERN Multimedia

    P. McBride

    It has been a very active year for the computing project with strong contributions from members of the global community. The project has focused on site preparation and Monte Carlo production. The operations group has begun processing data from P5 as part of the global data commissioning. Improvements in transfer rates and site availability have been seen as computing sites across the globe prepare for large scale production and analysis as part of CSA07. Preparations for the upcoming Computing Software and Analysis Challenge CSA07 are progressing. Ian Fisk and Neil Geddes have been appointed as coordinators for the challenge. CSA07 will include production tests of the Tier-0 production system, reprocessing at the Tier-1 sites and Monte Carlo production at the Tier-2 sites. At the same time there will be a large analysis exercise at the Tier-2 centres. Pre-production simulation of the Monte Carlo events for the challenge is beginning. Scale tests of the Tier-0 will begin in mid-July and the challenge it...

  9. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion The Tier 0 infrastructure was able to repack and promptly reconstruct heavy-ion collision data. Two copies were made of the data at CERN using a large CASTOR disk pool, and the core physics sample was replicated ...

  10. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the co...

  11. COMPUTING

    CERN Multimedia

    I. Fisk

    2012-01-01

    Introduction Computing continued with a high level of activity over the winter in preparation for conferences and the start of the 2012 run. 2012 brings new challenges with a new energy, more complex events, and the need to make the best use of the available time before the Long Shutdown. We expect to be resource constrained on all tiers of the computing system in 2012 and are working to ensure the high-priority goals of CMS are not impacted. Heavy ions After a successful 2011 heavy-ion run, the programme is moving to analysis. During the run, the CAF resources were well used for prompt analysis. Since then in 2012 on average 200 job slots have been used continuously at Vanderbilt for analysis workflows. Operations Office As of 2012, the Computing Project emphasis has moved from commissioning to operation of the various systems. This is reflected in the new organisation structure where the Facilities and Data Operations tasks have been merged into a common Operations Office, which now covers everything ...

  12. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction During the past six months, Computing participated in the STEP09 exercise, had a major involvement in the October exercise and has been working with CMS sites on improving open issues relevant for data taking. At the same time operations for MC production, real data reconstruction and re-reconstructions and data transfers at large scales were performed. STEP09 was successfully conducted in June as a joint exercise with ATLAS and the other experiments. It gave good indication about the readiness of the WLCG infrastructure with the two major LHC experiments stressing the reading, writing and processing of physics data. The October Exercise, in contrast, was conducted as an all-CMS exercise, where Physics, Computing and Offline worked on a common plan to exercise all steps to efficiently access and analyze data. As one of the major results, the CMS Tier-2s demonstrated to be fully capable for performing data analysis. In recent weeks, efforts were devoted to CMS Computing readiness. All th...

  13. ACONC Files

    Data.gov (United States)

    U.S. Environmental Protection Agency — ACONC files containing simulated ozone and PM2.5 fields that were used to create the model difference plots shown in the journal article. This dataset is associated...

  14. 831 Files

    Data.gov (United States)

    Social Security Administration — SSA-831 file is a collection of initial and reconsideration adjudicative level DDS disability determinations. (A few hearing level cases are also present, but the...

  15. COMPUTING

    CERN Multimedia

    Matthias Kasemann

    Overview The main focus during the summer was to handle data coming from the detector and to perform Monte Carlo production. The lessons learned during the CCRC and CSA08 challenges in May were addressed by dedicated PADA campaigns lead by the Integration team. Big improvements were achieved in the stability and reliability of the CMS Tier1 and Tier2 centres by regular and systematic follow-up of faults and errors with the help of the Savannah bug tracking system. In preparation for data taking the roles of a Computing Run Coordinator and regular computing shifts monitoring the services and infrastructure as well as interfacing to the data operations tasks are being defined. The shift plan until the end of 2008 is being put together. User support worked on documentation and organized several training sessions. The ECoM task force delivered the report on “Use Cases for Start-up of pp Data-Taking” with recommendations and a set of tests to be performed for trigger rates much higher than the ...

  16. COMPUTING

    CERN Multimedia

    P. MacBride

    The Computing Software and Analysis Challenge CSA07 has been the main focus of the Computing Project for the past few months. Activities began over the summer with the preparation of the Monte Carlo data sets for the challenge and tests of the new production system at the Tier-0 at CERN. The pre-challenge Monte Carlo production was done in several steps: physics generation, detector simulation, digitization, conversion to RAW format and the samples were run through the High Level Trigger (HLT). The data was then merged into three "Soups": Chowder (ALPGEN), Stew (Filtered Pythia) and Gumbo (Pythia). The challenge officially started when the first Chowder events were reconstructed on the Tier-0 on October 3rd. The data operations teams were very busy during the the challenge period. The MC production teams continued with signal production and processing while the Tier-0 and Tier-1 teams worked on splitting the Soups into Primary Data Sets (PDS), reconstruction and skimming. The storage sys...

  17. COMPUTING

    CERN Document Server

    2010-01-01

    Introduction Just two months after the “LHC First Physics” event of 30th March, the analysis of the O(200) million 7 TeV collision events in CMS accumulated during the first 60 days is well under way. The consistency of the CMS computing model has been confirmed during these first weeks of data taking. This model is based on a hierarchy of use-cases deployed between the different tiers and, in particular, the distribution of RECO data to T1s, who then serve data on request to T2s, along a topology known as “fat tree”. Indeed, during this period this model was further extended by almost full “mesh” commissioning, meaning that RECO data were shipped to T2s whenever possible, enabling additional physics analyses compared with the “fat tree” model. Computing activities at the CMS Analysis Facility (CAF) have been marked by a good time response for a load almost evenly shared between ALCA (Alignment and Calibration tasks - highest p...

  18. COMPUTING

    CERN Multimedia

    I. Fisk

    2013-01-01

    Computing operation has been lower as the Run 1 samples are completing and smaller samples for upgrades and preparations are ramping up. Much of the computing activity is focusing on preparations for Run 2 and improvements in data access and flexibility of using resources. Operations Office Data processing was slow in the second half of 2013 with only the legacy re-reconstruction pass of 2011 data being processed at the sites.   Figure 1: MC production and processing was more in demand with a peak of over 750 Million GEN-SIM events in a single month.   Figure 2: The transfer system worked reliably and efficiently and transferred on average close to 520 TB per week with peaks at close to 1.2 PB.   Figure 3: The volume of data moved between CMS sites in the last six months   The tape utilisation was a focus for the operation teams with frequent deletion campaigns from deprecated 7 TeV MC GEN-SIM samples to INVALID datasets, which could be cleaned up...

  19. COMPUTING

    CERN Multimedia

    I. Fisk

    2012-01-01

      Introduction Computing activity has been running at a sustained, high rate as we collect data at high luminosity, process simulation, and begin to process the parked data. The system is functional, though a number of improvements are planned during LS1. Many of the changes will impact users, we hope only in positive ways. We are trying to improve the distributed analysis tools as well as the ability to access more data samples more transparently.  Operations Office Figure 2: Number of events per month, for 2012 Since the June CMS Week, Computing Operations teams successfully completed data re-reconstruction passes and finished the CMSSW_53X MC campaign with over three billion events available in AOD format. Recorded data was successfully processed in parallel, exceeding 1.2 billion raw physics events per month for the first time in October 2012 due to the increase in data-parking rate. In parallel, large efforts were dedicated to WMAgent development and integrati...

  20. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction A large fraction of the effort was focused during the last period into the preparation and monitoring of the February tests of Common VO Computing Readiness Challenge 08. CCRC08 is being run by the WLCG collaboration in two phases, between the centres and all experiments. The February test is dedicated to functionality tests, while the May challenge will consist of running at all centres and with full workflows. For this first period, a number of functionality checks of the computing power, data repositories and archives as well as network links are planned. This will help assess the reliability of the systems under a variety of loads, and identifying possible bottlenecks. Many tests are scheduled together with other VOs, allowing the full scale stress test. The data rates (writing, accessing and transfer¬ring) are being checked under a variety of loads and operating conditions, as well as the reliability and transfer rates of the links between Tier-0 and Tier-1s. In addition, the capa...

  1. COMPUTING

    CERN Multimedia

    Contributions from I. Fisk

    2012-01-01

    Introduction The start of the 2012 run has been busy for Computing. We have reconstructed, archived, and served a larger sample of new data than in 2011, and we are in the process of producing an even larger new sample of simulations at 8 TeV. The running conditions and system performance are largely what was anticipated in the plan, thanks to the hard work and preparation of many people. Heavy ions Heavy Ions has been actively analysing data and preparing for conferences.  Operations Office Figure 6: Transfers from all sites in the last 90 days For ICHEP and the Upgrade efforts, we needed to produce and process record amounts of MC samples while supporting the very successful data-taking. This was a large burden, especially on the team members. Nevertheless the last three months were very successful and the total output was phenomenal, thanks to our dedicated site admins who keep the sites operational and the computing project members who spend countless hours nursing the...

  2. Identifiable Data Files - Denominator File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Denominator File combines Medicare beneficiary entitlement status information from administrative enrollment records with third-party payer information and GHP...

  3. File Type Identification of File Fragments using Longest Common Subsequence (LCS)

    Science.gov (United States)

    Rahmat, R. F.; Nicholas, F.; Purnamawati, S.; Sitompul, O. S.

    2017-01-01

    Computer forensic analyst is a person in charge of investigation and evidence tracking. In certain cases, the file needed to be presented as digital evidence was deleted. It is difficult to reconstruct the file, because it often lost its header and cannot be identified while being restored. Therefore, a method is required for identifying the file type of file fragments. In this research, we propose Longest Common Subsequences that consists of three steps, namely training, testing and validation, to identify the file type from file fragments. From all testing results we can conlude that our proposed method works well and achieves 92.91% of accuracy to identify the file type of file fragment for three data types.

  4. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction The Computing Team successfully completed the storage, initial processing, and distribution for analysis of proton-proton data in 2011. There are still a variety of activities ongoing to support winter conference activities and preparations for 2012. Heavy ions The heavy-ion run for 2011 started in early November and has already demonstrated good machine performance and success of some of the more advanced workflows planned for 2011. Data collection will continue until early December. Facilities and Infrastructure Operations Operational and deployment support for WMAgent and WorkQueue+Request Manager components, routinely used in production by Data Operations, are provided. The GlideInWMS and components installation are now deployed at CERN, which is added to the GlideInWMS factory placed in the US. There has been new operational collaboration between the CERN team and the UCSD GlideIn factory operators, covering each others time zones by monitoring/debugging pilot jobs sent from the facto...

  5. A heuristic for computing a new value-based stationary policy for the stochastic joint replenishment problem

    DEFF Research Database (Denmark)

    Larsen, Christian

    2014-01-01

    -dimensional. Knowledge about good order-op.to values is important. So in order to secure that these order-up-to values are hit when making a joint order, an allocated order cost is constructed for each item. Furthermore, a relaxation parameter α is introducted such that one can, if convenient, make it easier or more......A stationary control policy is constructed for the mulit-item stochastic joint replenishment problem. The cornerstone in the construction is a policy-iteratin improvement step which assumes that there is a single possibility for making a joint order and thus deviate from the rule that the items...... difficult to issue a joint order when following the policy-iteration step. Also, a vector of can-orders is employed, in case a joint order is made, to include additional items. The policy is denoted a (c, S, α ) policy. Numerical results show that is performs almost as well as the Q (s, S) policy...

  6. COMPUTING

    CERN Multimedia

    M. Kasemann

    CMS relies on a well functioning, distributed computing infrastructure. The Site Availability Monitoring (SAM) and the Job Robot submission have been very instrumental for site commissioning in order to increase availability of more sites such that they are available to participate in CSA07 and are ready to be used for analysis. The commissioning process has been further developed, including "lessons learned" documentation via the CMS twiki. Recently the visualization, presentation and summarizing of SAM tests for sites has been redesigned, it is now developed by the central ARDA project of WLCG. Work to test the new gLite Workload Management System was performed; a 4 times increase in throughput with respect to LCG Resource Broker is observed. CMS has designed and launched a new-generation traffic load generator called "LoadTest" to commission and to keep exercised all data transfer routes in the CMS PhE-DEx topology. Since mid-February, a transfer volume of about 12 P...

  7. An analysis of file system and installation of the file management system for NOS operating system

    International Nuclear Information System (INIS)

    Lee, Young Jai; Park, Sun Hee; Hwang, In Ah; Kim, Hee Kyung

    1992-06-01

    In this technical report, we analyze NOS file structure for Cyber 170-875 and Cyber 960-31 computer system. We also describe functions, procedure and how-to-operate and how-to-use of VDS. VDS is used to manage large files effectively for Cyber computer system. The purpose of the VDS installation is to increase the virtual disk storage by utilizing magnetic tape, to assist the users of the computer system in managing their files, and to enhance the performance of KAERI Cyber computer system. (Author)

  8. Verification of Security Policy Enforcement in Enterprise Systems

    Science.gov (United States)

    Gupta, Puneet; Stoller, Scott D.

    Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.

  9. Detection Of Alterations In Audio Files Using Spectrograph Analysis

    Directory of Open Access Journals (Sweden)

    Anandha Krishnan G

    2015-08-01

    Full Text Available The corresponding study was carried out to detect changes in audio file using spectrograph. An audio file format is a file format for storing digital audio data on a computer system. A sound spectrograph is a laboratory instrument that displays a graphical representation of the strengths of the various component frequencies of a sound as time passes. The objectives of the study were to find the changes in spectrograph of audio after altering them to compare altering changes with spectrograph of original files and to check for similarity and difference in mp3 and wav. Five different alterations were carried out on each audio file to analyze the differences between the original and the altered file. For altering the audio file MP3 or WAV by cutcopy the file was opened in Audacity. A different audio was then pasted to the audio file. This new file was analyzed to view the differences. By adjusting the necessary parameters the noise was reduced. The differences between the new file and the original file were analyzed. By adjusting the parameters from the dialog box the necessary changes were made. The edited audio file was opened in the software named spek where after analyzing a graph is obtained of that particular file which is saved for further analysis. The original audio graph received was combined with the edited audio file graph to see the alterations.

  10. Computer Viruses. Technology Update.

    Science.gov (United States)

    Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp.

    This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…

  11. Router Agent Technology for Policy-Based Network Management

    Science.gov (United States)

    Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston

    2011-01-01

    This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.

  12. Fast probabilistic file fingerprinting for big data.

    Science.gov (United States)

    Tretyakov, Konstantin; Laur, Sven; Smant, Geert; Vilo, Jaak; Prins, Pjotr

    2013-01-01

    Biological data acquisition is raising new challenges, both in data analysis and handling. Not only is it proving hard to analyze the data at the rate it is generated today, but simply reading and transferring data files can be prohibitively slow due to their size. This primarily concerns logistics within and between data centers, but is also important for workstation users in the analysis phase. Common usage patterns, such as comparing and transferring files, are proving computationally expensive and are tying down shared resources. We present an efficient method for calculating file uniqueness for large scientific data files, that takes less computational effort than existing techniques. This method, called Probabilistic Fast File Fingerprinting (PFFF), exploits the variation present in biological data and computes file fingerprints by sampling randomly from the file instead of reading it in full. Consequently, it has a flat performance characteristic, correlated with data variation rather than file size. We demonstrate that probabilistic fingerprinting can be as reliable as existing hashing techniques, with provably negligible risk of collisions. We measure the performance of the algorithm on a number of data storage and access technologies, identifying its strengths as well as limitations. Probabilistic fingerprinting may significantly reduce the use of computational resources when comparing very large files. Utilisation of probabilistic fingerprinting techniques can increase the speed of common file-related workflows, both in the data center and for workbench analysis. The implementation of the algorithm is available as an open-source tool named pfff, as a command-line tool as well as a C library. The tool can be downloaded from http://biit.cs.ut.ee/pfff.

  13. COMPUTER SECURITY AND SECURITY TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Lazar Stošić

    2013-01-01

    Full Text Available With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information. A set of tools, procedures, policies and solutions to defend against attacks are collectively referred to as computer network security. It is necessary above all to define and learn about the concepts of attack, risk, threat, vulnerability and asset value. During the design and implementation of information systems should primarily take into account a set of measures to increase security and maintenance at an acceptable level of risk. In any case, there is a need to know the risks in the information system. Sources of potential security problems are challenges and attacks, while the risk relates to the probable outcome and its associated costs due to occurrence of certain events. There are numerous techniques help protect your computer: cryptography, authentication, checked the software, licenses and certificates, valid authorization... This paper explains some of the procedures and potential threats to break into the network and computers as well as potential programs that are used. Guidance and explanation of these programs is not to cause a break-in at someone else's computer, but to highlight the vulnerability of the computer's capabilities.

  14. HUD GIS Boundary Files

    Data.gov (United States)

    Department of Housing and Urban Development — The HUD GIS Boundary Files are intended to supplement boundary files available from the U.S. Census Bureau. The files are for community planners interested in...

  15. Online file sharing innovations in media consumption

    CERN Document Server

    Andersson Schwarz, Jonas

    2013-01-01

    It is apparent that file sharing on the Internet has become an emerging norm of media consumption-especially among young people. This book provides a critical perspective on this phenomenon, exploring issues related to file sharing, downloading, peer-to-peer networks, ""piracy,"" and (not least) policy issues regarding these practices. Andersson Schwartz critically engages with the justificatory discourses of the actual file-sharers, taking Sweden as a geographic focus. By focusing on the example of Sweden-home to both The Pirate Bay and Spotify-he provides a unique insight into a mentality th

  16. Jeffrey Burns: The music of psalms, Proverbs and Job in the Hebrew bible : A revised theory of musical accents in the Hebrew bible ; general analysis, bibliography, table of contents CD with complete text and audio files of musically reconstructed psalms, proverbs and Job, sung by computer speech synthesis \\ [rezensiert von] Zsolt Balla

    OpenAIRE

    Balla, Zsolt

    2012-01-01

    rezensiertes Werk: Jeffrey Burns: The music of psalms, Proverbs and Job in the Hebrew bible : A revised theory of musical accents in the Hebrew bible ; general analysis, bibliography, table of contents CD with complete text and audio files of musically reconstructed psalms, proverbs and Job, sung by computer speech synthesis. Wiesbaden : Harrassowitz Verlag, 2011. 169 S. ISBN 978-3-447-06191-9

  17. Parallel file system with metadata distributed across partitioned key-value store c

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary; Torres, Aaron

    2017-09-19

    Improved techniques are provided for storing metadata associated with a plurality of sub-files associated with a single shared file in a parallel file system. The shared file is generated by a plurality of applications executing on a plurality of compute nodes. A compute node implements a Parallel Log Structured File System (PLFS) library to store at least one portion of the shared file generated by an application executing on the compute node and metadata for the at least one portion of the shared file on one or more object storage servers. The compute node is also configured to implement a partitioned data store for storing a partition of the metadata for the shared file, wherein the partitioned data store communicates with partitioned data stores on other compute nodes using a message passing interface. The partitioned data store can be implemented, for example, using Multidimensional Data Hashing Indexing Middleware (MDHIM).

  18. Computer Games as a Tool for Implementation of Memory Policy (on the Example of Displaying Events of The Great Patriotic War in Video Games

    Directory of Open Access Journals (Sweden)

    Сергей Игоревич Белов

    2018-12-01

    Full Text Available The presented work is devoted to the study of the practice of using computer games as a tool of the memory policy. The relevance of this study determines both the growth of the importance of video games as a means of forming ideas about the events of the past, and a low degree of study of this topic. As the goal of the author's research, the research is to identify the prospects for using computer games as an instrument for implementing the memory policy within the framework of the case of the events of the Great Patriotic War. The empirical base of the work was formed due to the generalization of the content of such video games as “Call of Duty 1”, “Call of Duty 14: WWII”, “Company of Heroes 2” and “Commandos 3: Destination Berlin”. The methodological base of the research is formed due to the involvement of elements of descriptive political analysis, the theory of operant conditioning B.F. Skinner and the concept of social identity H. Tajfel and J. Turner. The author comes to the conclusion that familiarization of users with the designated games contributes to the consolidation in the minds of users of negative stereotypes regarding the participation of the Red Army in the Great Patriotic War. The process of integration of negative images is carried out using the methods of operant conditioning. The integration of the system of negative images into the mass consciousness of the inhabitants of the post-Soviet space makes it difficult to preserve the remnants of Soviet political symbols and elements constructed on their basis identity. The author puts forward the hypothesis that in the case of complete desovietization of the public policy space in the states that emerged as a result of the collapse of the USSR, the task of revising the history of the Great Patriotic War will be greatly facilitated, and with the subsequent departure from the life of the last eyewitnesses of the relevant events, achieving this goal will be only a

  19. Schools (Students) Exchanging CAD/CAM Files over the Internet.

    Science.gov (United States)

    Mahoney, Gary S.; Smallwood, James E.

    This document discusses how students and schools can benefit from exchanging computer-aided design/computer-aided manufacturing (CAD/CAM) files over the Internet, explains how files are exchanged, and examines the problem of selected hardware/software incompatibility. Key terms associated with information search services are defined, and several…

  20. Further computer appreciation

    CERN Document Server

    Fry, T F

    2014-01-01

    Further Computer Appreciation is a comprehensive cover of the principles and aspects in computer appreciation. The book starts by describing the development of computers from the first to the third computer generations, to the development of processors and storage systems, up to the present position of computers and future trends. The text tackles the basic elements, concepts and functions of digital computers, computer arithmetic, input media and devices, and computer output. The basic central processor functions, data storage and the organization of data by classification of computer files,

  1. Methods and Algorithms for Detecting Objects in Video Files

    Directory of Open Access Journals (Sweden)

    Nguyen The Cuong

    2018-01-01

    Full Text Available Video files are files that store motion pictures and sounds like in real life. In today's world, the need for automated processing of information in video files is increasing. Automated processing of information has a wide range of application including office/home surveillance cameras, traffic control, sports applications, remote object detection, and others. In particular, detection and tracking of object movement in video file plays an important role. This article describes the methods of detecting objects in video files. Today, this problem in the field of computer vision is being studied worldwide.

  2. Image files - RPD | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available switchLanguage; BLAST Search Image Search Home About Archive Update History Data ...ftp://ftp.biosciencedbc.jp/archive/rpd/LATEST/rpd_gel_image.zip File size: 38.5 MB Simple search URL - Data ... License Update History of This Database Site Policy | Contact Us Image files - RPD | LSDB Archive ...

  3. Method and apparatus for routing data in an inter-nodal communications lattice of a massively parallel computer system by semi-randomly varying routing policies for different packets

    Science.gov (United States)

    Archer, Charles Jens; Musselman, Roy Glenn; Peters, Amanda; Pinnow, Kurt Walter; Swartz, Brent Allen; Wallenfelt, Brian Paul

    2010-11-23

    A massively parallel computer system contains an inter-nodal communications network of node-to-node links. Nodes vary a choice of routing policy for routing data in the network in a semi-random manner, so that similarly situated packets are not always routed along the same path. Semi-random variation of the routing policy tends to avoid certain local hot spots of network activity, which might otherwise arise using more consistent routing determinations. Preferably, the originating node chooses a routing policy for a packet, and all intermediate nodes in the path route the packet according to that policy. Policies may be rotated on a round-robin basis, selected by generating a random number, or otherwise varied.

  4. Provider of Services File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The POS file consists of two data files, one for CLIA labs and one for 18 other provider types. The file names are CLIA and OTHER. If downloading the file, note it...

  5. 12 CFR 269b.111 - Filing of charges.

    Science.gov (United States)

    2010-01-01

    ... CHARGES OF UNFAIR LABOR PRACTICES Charges of Violations of § 269.6 (of the Policy) § 269b.111 Filing of... of the Federal Reserve System Labor Relations Panel, 20th Street and Constitution Avenue NW...

  6. Protecting your files on the DFS file system

    CERN Multimedia

    Computer Security Team

    2011-01-01

    The Windows Distributed File System (DFS) hosts user directories for all NICE users plus many more data.    Files can be accessed from anywhere, via a dedicated web portal (http://cern.ch/dfs). Due to the ease of access to DFS with in CERN it is of utmost importance to properly protect access to sensitive data. As the use of DFS access control mechanisms is not obvious to all users, passwords, certificates or sensitive files might get exposed. At least this happened in past to the Andrews File System (AFS) - the Linux equivalent to DFS) - and led to bad publicity due to a journalist accessing supposedly "private" AFS folders (SonntagsZeitung 2009/11/08). This problem does not only affect the individual user but also has a bad impact on CERN's reputation when it comes to IT security. Therefore, all departments and LHC experiments agreed recently to apply more stringent protections to all DFS user folders. The goal of this data protection policy is to assist users in pro...

  7. Protecting your files on the AFS file system

    CERN Multimedia

    2011-01-01

    The Andrew File System is a world-wide distributed file system linking hundreds of universities and organizations, including CERN. Files can be accessed from anywhere, via dedicated AFS client programs or via web interfaces that export the file contents on the web. Due to the ease of access to AFS it is of utmost importance to properly protect access to sensitive data in AFS. As the use of AFS access control mechanisms is not obvious to all users, passwords, private SSH keys or certificates have been exposed in the past. In one specific instance, this also led to bad publicity due to a journalist accessing supposedly "private" AFS folders (SonntagsZeitung 2009/11/08). This problem does not only affect the individual user but also has a bad impact on CERN's reputation when it comes to IT security. Therefore, all departments and LHC experiments agreed in April 2010 to apply more stringent folder protections to all AFS user folders. The goal of this data protection policy is to assist users in...

  8. Network File - TP Atlas | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available List Contact us TP Atlas Network File Data detail Data name Network File DOI 10.18908/lsdba.nbdc01161-003 De...scription of data contents Network diagrams (in CSML format) for each project. One project has one pathway f... Update History of This Database Site Policy | Contact Us Network File - TP Atlas | LSDB Archive ...

  9. 32 CFR 197.4 - Policy.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 197.4 Section 197.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS HISTORICAL RESEARCH IN THE FILES OF THE OFFICE OF THE SECRETARY OF DEFENSE (OSD) § 197.4 Policy. It is DoD policy...

  10. Reporting Differences Between Spacecraft Sequence Files

    Science.gov (United States)

    Khanampompan, Teerapat; Gladden, Roy E.; Fisher, Forest W.

    2010-01-01

    A suite of computer programs, called seq diff suite, reports differences between the products of other computer programs involved in the generation of sequences of commands for spacecraft. These products consist of files of several types: replacement sequence of events (RSOE), DSN keyword file [DKF (wherein DSN signifies Deep Space Network)], spacecraft activities sequence file (SASF), spacecraft sequence file (SSF), and station allocation file (SAF). These products can include line numbers, request identifications, and other pieces of information that are not relevant when generating command sequence products, though these fields can result in the appearance of many changes to the files, particularly when using the UNIX diff command to inspect file differences. The outputs of prior software tools for reporting differences between such products include differences in these non-relevant pieces of information. In contrast, seq diff suite removes the fields containing the irrelevant pieces of information before processing to extract differences, so that only relevant differences are reported. Thus, seq diff suite is especially useful for reporting changes between successive versions of the various products and in particular flagging difference in fields relevant to the sequence command generation and review process.

  11. 29 CFR 4000.28 - What if I send a computer disk?

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false What if I send a computer disk? 4000.28 Section 4000.28... I send a computer disk? (a) In general. We determine your filing or issuance date for a computer... paragraph (b) of this section. (1) Filings. For computer-disk filings, we may treat your submission as...

  12. Protecting Your Computer from Viruses

    Science.gov (United States)

    Descy, Don E.

    2006-01-01

    A computer virus is defined as a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. The existence of computer viruses--or the necessity of avoiding viruses--is part of using a computer. With the advent of the Internet, the door was opened wide for these…

  13. UPIN Group File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Group Unique Physician Identifier Number (UPIN) File is the business entity file that contains the group practice UPIN and descriptive information. It does NOT...

  14. 48 CFR 719.270 - Small business policies.

    Science.gov (United States)

    2010-10-01

    ... contract file. (h) SDB shall be the Small Business Advisor and Minority Business Procurement Policy Manager... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Small business policies... SOCIOECONOMIC PROGRAMS SMALL BUSINESS PROGRAMS Policies 719.270 Small business policies. (a) In keeping with...

  15. Grammar-Based Specification and Parsing of Binary File Formats

    Directory of Open Access Journals (Sweden)

    William Underwood

    2012-03-01

    Full Text Available The capability to validate and view or play binary file formats, as well as to convert binary file formats to standard or current file formats, is critically important to the preservation of digital data and records. This paper describes the extension of context-free grammars from strings to binary files. Binary files are arrays of data types, such as long and short integers, floating-point numbers and pointers, as well as characters. The concept of an attribute grammar is extended to these context-free array grammars. This attribute grammar has been used to define a number of chunk-based and directory-based binary file formats. A parser generator has been used with some of these grammars to generate syntax checkers (recognizers for validating binary file formats. Among the potential benefits of an attribute grammar-based approach to specification and parsing of binary file formats is that attribute grammars not only support format validation, but support generation of error messages during validation of format, validation of semantic constraints, attribute value extraction (characterization, generation of viewers or players for file formats, and conversion to current or standard file formats. The significance of these results is that with these extensions to core computer science concepts, traditional parser/compiler technologies can potentially be used as a part of a general, cost effective curation strategy for binary file formats.

  16. Defining nuclear medical file format based on DICOM standard

    International Nuclear Information System (INIS)

    He Bin; Jin Yongjie; Li Yulan

    2000-01-01

    With the wide using of computer technology in medical area, DICOM is becoming the standard of digital imaging and communication. The author discusses how to define medical imaging file format based on DICOM standard. It also introduces the file format of ANMIS system authors defined and the validity and integrality of this format

  17. Does Mood Change How We Organize Digital Files?

    Science.gov (United States)

    Massey, Charlotte

    2017-01-01

    Retrieving files from one's computer is done daily and is an essential part of completing most tasks at work, yet surprisingly little research has examined the ways that people structure and organize their files. Management of personal digital information is a challenging task that users approach idiosyncratically. Large individual differences…

  18. Computer Virus Protection

    Science.gov (United States)

    Rajala, Judith B.

    2004-01-01

    A computer virus is a program--a piece of executable code--that has the unique ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file, and are spread by replicating and being sent from one individual to another. Simply having…

  19. Text File Comparator

    Science.gov (United States)

    Kotler, R. S.

    1983-01-01

    File Comparator program IFCOMP, is text file comparator for IBM OS/VScompatable systems. IFCOMP accepts as input two text files and produces listing of differences in pseudo-update form. IFCOMP is very useful in monitoring changes made to software at the source code level.

  20. 48 CFR 227.7203-1 - Policy.

    Science.gov (United States)

    2010-10-01

    ... acquisition plan shall address acquisition strategies that provide for computer software and computer software... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer...

  1. Securing the AliEn File Catalogue - Enforcing authorization with accountable file operations

    International Nuclear Information System (INIS)

    Schreiner, Steffen; Banerjee, Subho Sankar; Betev, Latchezar; Carminati, Federico; Vladimirovna Datskova, Olga; Furano, Fabrizio; Grigoras, Alina; Grigoras, Costin; Mendez Lorenzo, Patricia; Peters, Andreas Joachim; Saiz, Pablo; Bagnasco, Stefano; Zhu Jianlin

    2011-01-01

    The AliEn Grid Services, as operated by the ALICE Collaboration in its global physics analysis grid framework, is based on a central File Catalogue together with a distributed set of storage systems and the possibility to register links to external data resources. This paper describes several identified vulnerabilities in the AliEn File Catalogue access protocol regarding fraud and unauthorized file alteration and presents a more secure and revised design: a new mechanism, called LFN Booking Table, is introduced in order to keep track of access authorization in the transient state of files entering or leaving the File Catalogue. Due to a simplification of the original Access Envelope mechanism for xrootd-protocol-based storage systems, fundamental computational improvements of the mechanism were achieved as well as an up to 50% reduction of the credential's size. By extending the access protocol with signed status messages from the underlying storage system, the File Catalogue receives trusted information about a file's size and checksum and the protocol is no longer dependent on client trust. Altogether, the revised design complies with atomic and consistent transactions and allows for accountable, authentic, and traceable file operations. This paper describes these changes as part and beyond the development of AliEn version 2.19.

  2. Detection Method of the Remaining Files Based on Logs Regarding Changed Directory and Hash Values

    Science.gov (United States)

    Ishizawa, Chikako; Andoh, Yuu; Nishida, Makoto

    There are a lot of information leakages because the files are copied from the removable storage medium and are left in the storage unit of personal computer without deleting. In order to prevent human mistakes, this paper proposes a method for detecting the remaining files copied from the removable storage medium. The proposed method records logs regarding changed information registering in a directory that is management list of files in storage unit and the hash values of file contents. The remaining files are detected when the removable storage medium removes from the personal computer, and they are displayed on the monitor. The detection processing works in five steps. First, copy operation toward file is detected by tracing the sequence of logs. Secondly, files copied from the removable storage medium are distinguished based on hash values. Thirdly, file operation and folder operation to copied files are distinguished. Fourthly, the deletion operation against the copied file is detected by using file name and path matching. Finally, file name and path using for tracing are changed according to folder operation. In case of the deletion operation is not found, it is judged that copied files are remaining. Our experimental result suggests that the proposed method can accurately detect remaining files left on the storage unit.

  3. Automatic Creation of Stepper Job Files

    Science.gov (United States)

    Dailor, David S.

    1989-07-01

    Application Specific Integrated Circuit (ASIC) manufacturing, characterized by fast cycle time, small lot sizes and an abundance of products and process flows, creates challenges not found in a dedicated product line. The continuous addition of new devices into the wafer fab creates problems such as reticle storage, critical dimensions specifications and stepper set-up. One of the stepper set-up problems is stepper job file generation. Each device run on a stepper requires several job files to be created. The number of job files created for each device is dependent on the manufacturing environment, the alignment scheme, process flow and stepper used. There can be as many job files as there are layers for each device. Data from the reticle layout engineer is entered into the stepper by the process engineer to define the stepping array, location of alignment marks, framing blade settings and other exposure related information. This process is time consuming and removes a machine from production while job files are being written and tested. In an ASIC environment where several new devices start each week, creating stepper job files is a major problem impacting: productivity, cycle time, process yield and the rework rate. A solution to all of these problems: automate the stepper job file generation process. Our stepper job files are created automatically by computer when the reticles are tooled. Stepper job files are ready before the masks arrive and they are always correct. The result is improved productivity and process yields with reduced reworks and prototype cycle times. A description of this automated approach and the necessary items to implement this technique is presented.

  4. MR-AFS: a global hierarchical file-system

    International Nuclear Information System (INIS)

    Reuter, H.

    2000-01-01

    The next generation of fusion experiments will use object-oriented technology creating the need for world wide sharing of an underlying hierarchical file-system. The Andrew file system (AFS) is a well known and widely spread global distributed file-system. Multiple-resident-AFS (MR-AFS) combines the features of AFS with hierarchical storage management systems. Files in MR-AFS therefore may be migrated on secondary storage, such as roboted tape libraries. MR-AFS is in use at IPP for the current experiments and data originating from super-computer applications. Experiences and scalability issues are discussed

  5. CryptoCache: A Secure Sharable File Cache for Roaming Users

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2000-01-01

    Small mobile computers are now sufficiently powerful to run many applications, but storage capacity remains limited so working files cannot be cached or stored locally. Even if files can be stored locally, the mobile device is not powerful enough to act as server in collaborations with other users....... Conventional distributed file systems cache everything locally or not at all; there is no possibility to cache files on nearby nodes.In this paper we present the design of a secure cache system called CryptoCache that allows roaming users to cache files on untrusted file hosting servers. The system allows...

  6. Centralized Accounting and Electronic Filing Provides Efficient Receivables Collection.

    Science.gov (United States)

    School Business Affairs, 1983

    1983-01-01

    An electronic filing system makes financial control manageable at Bowling Green State University, Ohio. The system enables quick access to computer-stored consolidated account data and microfilm images of charges, statements, and other billing documents. (MLF)

  7. An information retrieval system for research file data

    Science.gov (United States)

    Joan E. Lengel; John W. Koning

    1978-01-01

    Research file data have been successfully retrieved at the Forest Products Laboratory through a high-speed cross-referencing system involving the computer program FAMULUS as modified by the Madison Academic Computing Center at the University of Wisconsin. The method of data input, transfer to computer storage, system utilization, and effectiveness are discussed....

  8. Utilizing HDF4 File Content Maps for the Cloud

    Science.gov (United States)

    Lee, Hyokyung Joe

    2016-01-01

    We demonstrate a prototype study that HDF4 file content map can be used for efficiently organizing data in cloud object storage system to facilitate cloud computing. This approach can be extended to any binary data formats and to any existing big data analytics solution powered by cloud computing because HDF4 file content map project started as long term preservation of NASA data that doesn't require HDF4 APIs to access data.

  9. LASIP-III, a generalized processor for standard interface files

    International Nuclear Information System (INIS)

    Bosler, G.E.; O'Dell, R.D.; Resnik, W.M.

    1976-03-01

    The LASIP-III code was developed for processing Version III standard interface data files which have been specified by the Committee on Computer Code Coordination. This processor performs two distinct tasks, namely, transforming free-field format, BCD data into well-defined binary files and providing for printing and punching data in the binary files. While LASIP-III is exported as a complete free-standing code package, techniques are described for easily separating the processor into two modules, viz., one for creating the binary files and one for printing the files. The two modules can be separated into free-standing codes or they can be incorporated into other codes. Also, the LASIP-III code can be easily expanded for processing additional files, and procedures are described for such an expansion. 2 figures, 8 tables

  10. GEODOC: the GRID document file, record structure and data element description

    Energy Technology Data Exchange (ETDEWEB)

    Trippe, T.; White, V.; Henderson, F.; Phillips, S.

    1975-11-06

    The purpose of this report is to describe the information structure of the GEODOC file. GEODOC is a computer based file which contains the descriptive cataloging and indexing information for all documents processed by the National Geothermal Information Resource Group. This file (along with other GRID files) is managed by DBMS, the Berkeley Data Base Management System. Input for the system is prepared using the IRATE Text Editing System with its extended (12 bit) character set, or punched cards.

  11. Distributed Data Management and Distributed File Systems

    CERN Document Server

    Girone, Maria

    2015-01-01

    The LHC program has been successful in part due to the globally distributed computing resources used for collecting, serving, processing, and analyzing the large LHC datasets. The introduction of distributed computing early in the LHC program spawned the development of new technologies and techniques to synchronize information and data between physically separated computing centers. Two of the most challenges services are the distributed file systems and the distributed data management systems. In this paper I will discuss how we have evolved from local site services to more globally independent services in the areas of distributed file systems and data management and how these capabilities may continue to evolve into the future. I will address the design choices, the motivations, and the future evolution of the computing systems used for High Energy Physics.

  12. Virus Alert: Ten Steps to Safe Computing.

    Science.gov (United States)

    Gunter, Glenda A.

    1997-01-01

    Discusses computer viruses and explains how to detect them; discusses virus protection and the need to update antivirus software; and offers 10 safe computing tips, including scanning floppy disks and commercial software, how to safely download files from the Internet, avoiding pirated software copies, and backing up files. (LRW)

  13. Adding Data Management Services to Parallel File Systems

    Energy Technology Data Exchange (ETDEWEB)

    Brandt, Scott [Univ. of California, Santa Cruz, CA (United States)

    2015-03-04

    The objective of this project, called DAMASC for “Data Management in Scientific Computing”, is to coalesce data management with parallel file system management to present a declarative interface to scientists for managing, querying, and analyzing extremely large data sets efficiently and predictably. Managing extremely large data sets is a key challenge of exascale computing. The overhead, energy, and cost of moving massive volumes of data demand designs where computation is close to storage. In current architectures, compute/analysis clusters access data in a physically separate parallel file system and largely leave it scientist to reduce data movement. Over the past decades the high-end computing community has adopted middleware with multiple layers of abstractions and specialized file formats such as NetCDF-4 and HDF5. These abstractions provide a limited set of high-level data processing functions, but have inherent functionality and performance limitations: middleware that provides access to the highly structured contents of scientific data files stored in the (unstructured) file systems can only optimize to the extent that file system interfaces permit; the highly structured formats of these files often impedes native file system performance optimizations. We are developing Damasc, an enhanced high-performance file system with native rich data management services. Damasc will enable efficient queries and updates over files stored in their native byte-stream format while retaining the inherent performance of file system data storage via declarative queries and updates over views of underlying files. Damasc has four key benefits for the development of data-intensive scientific code: (1) applications can use important data-management services, such as declarative queries, views, and provenance tracking, that are currently available only within database systems; (2) the use of these services becomes easier, as they are provided within a familiar file

  14. File access prediction using neural networks.

    Science.gov (United States)

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.

  15. Radiology Teaching Files on the Internet

    International Nuclear Information System (INIS)

    Lim, Eun Chung; Kim, Eun Kyung

    1996-01-01

    There is increasing attention about radiology teaching files on the Internet in the field of diagnostic radiology. The purpose of this study was to aid in the creation of new radiology teaching file by analysing the present radiology teaching file sites on the Internet with many aspects and evaluating images on those sites, using Macintosh II ci compute r, 28.8kbps TelePort Fax/Modem, Netscape Navigator 2.0 software. The results were as follow : 1. Analysis of radiology teaching file sites (1) Country distribution was the highest in USA (57.5%). (2) Average number of cases was 186 cases and radiology teaching file sites with search engine were 9 sites (22.5%). (3) At the method of case arrangement, anatomic area type and diagnosis type were found at the 10 sites (25%) each, question and answer type was found at the 9 sites (22.5%). (4) Radiology teaching file sites with oro-maxillofacial disorder were 9 sites (22.5%). (5) At the image format, GIF format was found at the 14 sites (35%), and JPEG format found at the 14 sites (35%). (6) Created year was the highest in 1995 (43.7%). (7) Continuing case upload was found at the 35 sites (87.5%). 2. Evaluation of images on the radiology teaching files (1) Average file size of GIF format (71 Kbyte) was greater than that of JPEG format (24 Kbyte). (P<0.001) (2) Image quality of GIF format was better than that of JPEG format. (P<0.001)

  16. Source Reference File

    Data.gov (United States)

    Social Security Administration — This file contains a national set of names and contact information for doctors, hospitals, clinics, and other facilities (known collectively as sources) from which...

  17. Patient Assessment File (PAF)

    Data.gov (United States)

    Department of Veterans Affairs — The Patient Assessment File (PAF) database compiles the results of the Patient Assessment Instrument (PAI) questionnaire filled out for intermediate care Veterans...

  18. 76 FR 62092 - Filing Procedures

    Science.gov (United States)

    2011-10-06

    ... INTERNATIONAL TRADE COMMISSION Filing Procedures AGENCY: International Trade Commission. ACTION: Notice of issuance of Handbook on Filing Procedures. SUMMARY: The United States International Trade Commission (``Commission'') is issuing a Handbook on Filing Procedures to replace its Handbook on Electronic...

  19. MalHaploFreq: A computer programme for estimating malaria haplotype frequencies from blood samples

    Directory of Open Access Journals (Sweden)

    Smith Thomas A

    2008-07-01

    Full Text Available Abstract Background Molecular markers, particularly those associated with drug resistance, are important surveillance tools that can inform policy choice. People infected with falciparum malaria often contain several genetically-distinct clones of the parasite; genotyping the patients' blood reveals whether or not the marker is present (i.e. its prevalence, but does not reveal its frequency. For example a person with four malaria clones may contain both mutant and wildtype forms of a marker but it is not possible to distinguish the relative frequencies of the mutant and wildtypes i.e. 1:3, 2:2 or 3:1. Methods An appropriate method for obtaining frequencies from prevalence data is by Maximum Likelihood analysis. A computer programme has been developed that allows the frequency of markers, and haplotypes defined by up to three codons, to be estimated from blood phenotype data. Results The programme has been fully documented [see Additional File 1] and provided with a user-friendly interface suitable for large scale analyses. It returns accurate frequencies and 95% confidence intervals from simulated dataset sets and has been extensively tested on field data sets. Additional File 1 User manual for MalHaploFreq. Click here for file Conclusion The programme is included [see Additional File 2] and/or may be freely downloaded from 1. It can then be used to extract molecular marker and haplotype frequencies from their prevalence in human blood samples. This should enhance the use of frequency data to inform antimalarial drug policy choice. Additional File 2 executable programme compiled for use on DOS or windows Click here for file

  20. 65,000 shades of grey: use of digital image files in light microscopy.

    Science.gov (United States)

    Shaw, Sidney L; Hinchcliffe, Edward H

    2013-01-01

    Computers dominate image capture and analysis in modern light microscopy. The output of an imaging experiment is a binary coded file, called an image file, which contains the spatial, temporal and intensity information present in the sample. Understanding what comprises an image file, and how these files are generated is necessary in order to optimize the use of the digital light microscope. In this chapter, we discuss image file formats, and the various components of these files, such as bit-depth, sampling rate, color theory, and compression, from the perspective of the non-computer scientist. We also discuss the problem of proprietary file formats, and how these often are incompatible with certain types of imaging software. We present several solutions to this issue. Finally, we present the use of digital movie formats, compression routines, and provide some real world examples for optimizing the generation of digital movies. Copyright © 2013 Elsevier Inc. All rights reserved.

  1. FHEO Filed Cases

    Data.gov (United States)

    Department of Housing and Urban Development — The dataset is a list of all the Title VIII fair housing cases filed by FHEO from 1/1/2007 - 12/31/2012 including the case number, case name, filing date, state and...

  2. Next generation WLCG File Transfer Service (FTS)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    LHC experiments at CERN and worldwide utilize WLCG resources and middleware components to perform distributed computing tasks. One of the most important tasks is reliable file replication. It is a complex problem, suffering from transfer failures, disconnections, transfer duplication, server and network overload, differences in storage systems, etc. To address these problems, EMI and gLite have provided the independent File Transfer Service (FTS) and Grid File Access Library (GFAL) tools. Their development started almost a decade ago, in the meantime, requirements in data management have changed - the old architecture of FTS and GFAL cannot keep support easily these changes. Technology has also been progressing: FTS and GFAL do not fit into the new paradigms (cloud, messaging, for example). To be able to serve the next stage of LHC data collecting (from 2013), we need a new generation of  these tools: FTS 3 and GFAL 2. We envision a service requiring minimal configuration, which can dynamically adapt to the...

  3. Study and development of a document file system with selective access

    International Nuclear Information System (INIS)

    Mathieu, Jean-Claude

    1974-01-01

    The objective of this research thesis was to design and to develop a set of software aimed at an efficient management of a document file system by using methods of selective access to information. Thus, the three main aspects of file processing (creation, modification, reorganisation) have been addressed. The author first presents the main problems related to the development of a comprehensive automatic documentation system, and their conventional solutions. Some future aspects, notably dealing with the development of peripheral computer technology, are also evoked. He presents the characteristics of INIS bibliographic records provided by the IAEA which have been used to create the files. In the second part, he briefly describes the file system general organisation. This system is based on the use of two main files: an inverse file which contains for each descriptor a list of of numbers of files indexed by this descriptor, and a dictionary of descriptor or input file which gives access to the inverse file. The organisation of these both files is then describes in a detailed way. Other related or associated files are created, and the overall architecture and mechanisms integrated into the file data input software are described, as well as various processing applied to these different files. Performance and possible development are finally discussed

  4. Land Reform and Food Security | Sanusi | Economic and Policy ...

    African Journals Online (AJOL)

    Economic and Policy Review. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 14, No 4 (2008) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register · Download this PDF file. The PDF file you selected should ...

  5. Scaling off grid power in Nigeria | Egbuche | Economic and Policy ...

    African Journals Online (AJOL)

    Economic and Policy Review. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 16, No 1 (2017) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register · Download this PDF file. The PDF file you selected should ...

  6. 47 CFR 64.1002 - International settlements policy.

    Science.gov (United States)

    2010-10-01

    ... (CONTINUED) MISCELLANEOUS RULES RELATING TO COMMON CARRIERS International Settlements Policy and Modification... accounting rate modification, filed pursuant to § 64.1001, that includes a settlement rate that is at or... behavior that is harmful to U.S. customers. Carriers and other parties filing complaints must support their...

  7. Low-Carbon Computing

    Science.gov (United States)

    Hignite, Karla

    2009-01-01

    Green information technology (IT) is grabbing more mainstream headlines--and for good reason. Computing, data processing, and electronic file storage collectively account for a significant and growing share of energy consumption in the business world and on higher education campuses. With greater scrutiny of all activities that contribute to an…

  8. 12 CFR Appendix A to Part 371 - File Structure for Qualified Financial Contract (QFC) Records

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false File Structure for Qualified Financial Contract... REGULATIONS AND STATEMENTS OF GENERAL POLICY RECORDKEEPING REQUIREMENTS FOR QUALIFIED FINANCIAL CONTRACTS Pt. 371, App. A Appendix A to Part 371—File Structure for Qualified Financial Contract (QFC) Records QFC...

  9. 47 CFR 1.9055 - Assignment of file numbers to spectrum leasing notifications and applications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Assignment of file numbers to spectrum leasing... GENERAL PRACTICE AND PROCEDURE Spectrum Leasing General Policies and Procedures § 1.9055 Assignment of file numbers to spectrum leasing notifications and applications. Spectrum leasing notifications or...

  10. JENDL special purpose data files

    International Nuclear Information System (INIS)

    Iijima, S.; Kawai, M.; Katakura, J.; Nakazawa, M.; Asami, T.; Nakagawa, T.

    1987-01-01

    An ad-hoc JNDC committee on special purpose data file discussed the general and specific features of the JENDL Special Purpose Data Files. And several special purpose data files were proposed. Brief sketch of the proposed files and the status of the some selected data are described. (author)

  11. Characteristics of file sharing and peer to peer networking | Opara ...

    African Journals Online (AJOL)

    A peer-to-peer (p2p) network allows computer hardware and software to function without the need for special server devices. While file sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multi-media (audio, video) resources, documents, or electronic books.

  12. File System Virtual Appliances

    Science.gov (United States)

    2010-05-01

    System [80]. In Sun’s VFS paper, Kleiman stated that “Sun is currently discussing with AT&T and Berkeley the merging of this interface with AT&T’s File...26] DeBergalis, M., Corbett, P., Kleiman , S., Lent, A., Noveck, D., Talpey, T., and Wittle, M. 2003. The Direct Access File System. In Conference on...Users Group Meeting. 481–496. [51] Katcher, J. 1997. PostMark: A New File System Benchmark. Tech. Rep. TR3022, Network Appliance. October. [52] Kleiman , S

  13. Dynamic Non-Hierarchical File Systems for Exascale Storage

    Energy Technology Data Exchange (ETDEWEB)

    Long, Darrell E. [Univ. of California, Santa Cruz, CA (United States); Miller, Ethan L [Univ. of California, Santa Cruz, CA (United States)

    2015-02-24

    This constitutes the final report for “Dynamic Non-Hierarchical File Systems for Exascale Storage”. The ultimate goal of this project was to improve data management in scientific computing and high-end computing (HEC) applications, and to achieve this goal we proposed: to develop the first, HEC-targeted, file system featuring rich metadata and provenance collection, extreme scalability, and future storage hardware integration as core design goals, and to evaluate and develop a flexible non-hierarchical file system interface suitable for providing more powerful and intuitive data management interfaces to HEC and scientific computing users. Data management is swiftly becoming a serious problem in the scientific community – while copious amounts of data are good for obtaining results, finding the right data is often daunting and sometimes impossible. Scientists participating in a Department of Energy workshop noted that most of their time was spent “...finding, processing, organizing, and moving data and it’s going to get much worse”. Scientists should not be forced to become data mining experts in order to retrieve the data they want, nor should they be expected to remember the naming convention they used several years ago for a set of experiments they now wish to revisit. Ideally, locating the data you need would be as easy as browsing the web. Unfortunately, existing data management approaches are usually based on hierarchical naming, a 40 year-old technology designed to manage thousands of files, not exabytes of data. Today’s systems do not take advantage of the rich array of metadata that current high-end computing (HEC) file systems can gather, including content-based metadata and provenance1 information. As a result, current metadata search approaches are typically ad hoc and often work by providing a parallel management system to the “main” file system, as is done in Linux (the locate utility), personal computers, and enterprise search

  14. Tough Policies, Incredible Policies?

    OpenAIRE

    Andres Velasco; Alejandro Neut

    2003-01-01

    We revisit the question of what determines the credibility of macroeconomic policies here, of promises to repay public debt. Almost all thinking on the issue has focused on governments' strategic decision to default (or erode the value of outstanding debt via inflation/devaluation). But sometimes governments default not because they want to, but because they cannot avoid it: adverse shocks leave them no option. We build a model in which default/devaluation can occur deliberately (for strategi...

  15. Development of data file system for cardiovascular nuclear medicine

    International Nuclear Information System (INIS)

    Hayashida, Kohei; Nishimura, Tsunehiko; Uehara, Toshiisa; Nisawa, Yoshifumi.

    1985-01-01

    A computer-assisted filing system for storing and processing data from cardiac pool scintigraphy and myocardial scintigraphy has been developed. Individual patient data are stored with his (her) identification number (ID) into floppy discs successively in order of receiving scintigraphy. Data for 900 patients can be stored per floppy disc. Scintigraphic findings can be outputted in a uniform file format, and can be used as a reporting format. Output or retrieval of filed individual patient data is possible according to each examination, disease code or ID. This system seems to be used for prospective study in patients with cardiovascular diseases. (Namekawa, K.)

  16. A World-Wide Web radiology teaching file server on the Internet.

    Science.gov (United States)

    Richardson, M L

    1995-02-01

    Radiology departments have traditionally used film-based collections of interesting cases for teaching purposes. Film-based files are expensive to create and duplicate, and they physically occupy considerable space. As one solution to these problems, our department created an on-line radiology teaching file in digital format. Our teaching file resides on a Macintosh Quadra 700 computer that is connected to the Internet, a worldwide network of interconnected computers, via our campus Ethernet network. Our digital teaching file images and text are composed in HyperText Markup Language (HTML) and are made available to the world with Webserver software known as MacHTTP. These teaching files are accessed using World-Wide Web (WWW) client software such as Mosaic, MacWeb, or Netscape. Our digital teaching file is available at no charge to anyone in the world with access to the Internet and WWW client software. Our radiology residents can access this file via several workstations in our department. Mosaic is an easy-to-use interface, and the use of our digital teaching file has increased significantly. In the 3 months since its creation, our teaching file has been accessed not only by our radiology residents but also by hundreds of other users in 33 countries. Use of Mosaic and the WWW format has resulted in an easy-to-use hypertext interface to the Internet, which allows even persons with little computer experience to navigate through the Internet, read text files, view images (stills and movies), and download files by merely pointing with the mouse and clicking on items of interest. This has allowed us to maintain a central teaching file that is physically small and easy to share with all the hospitals in our system. We invite the worldwide radiology community to access these files and to submit cases from their own teaching files to share with the rest of the world.

  17. DCFPAK: Dose coefficient data file package for Sandia National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Eckerman, K.F.; Leggett, R.W.

    1996-07-31

    The FORTRAN-based computer package DCFPAK (Dose Coefficient File Package) has been developed to provide electronic access to the dose coefficient data files summarized in Federal Guidance Reports 11 and 12. DCFPAK also provides access to standard information regarding decay chains and assembles dose coefficients for all dosimetrically significant radioactive progeny of a specified radionuclide. DCFPAK was designed for application on a PC but, with minor modifications, may be implemented on a UNIX workstation.

  18. Tuning HDF5 subfiling performance on parallel file systems

    Energy Technology Data Exchange (ETDEWEB)

    Byna, Suren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Chaarawi, Mohamad [Intel Corp. (United States); Koziol, Quincey [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Mainzer, John [The HDF Group (United States); Willmore, Frank [The HDF Group (United States)

    2017-05-12

    Subfiling is a technique used on parallel file systems to reduce locking and contention issues when multiple compute nodes interact with the same storage target node. Subfiling provides a compromise between the single shared file approach that instigates the lock contention problems on parallel file systems and having one file per process, which results in generating a massive and unmanageable number of files. In this paper, we evaluate and tune the performance of recently implemented subfiling feature in HDF5. In specific, we explain the implementation strategy of subfiling feature in HDF5, provide examples of using the feature, and evaluate and tune parallel I/O performance of this feature with parallel file systems of the Cray XC40 system at NERSC (Cori) that include a burst buffer storage and a Lustre disk-based storage. We also evaluate I/O performance on the Cray XC30 system, Edison, at NERSC. Our results show performance benefits of 1.2X to 6X performance advantage with subfiling compared to writing a single shared HDF5 file. We present our exploration of configurations, such as the number of subfiles and the number of Lustre storage targets to storing files, as optimization parameters to obtain superior I/O performance. Based on this exploration, we discuss recommendations for achieving good I/O performance as well as limitations with using the subfiling feature.

  19. Students "Hacking" School Computer Systems

    Science.gov (United States)

    Stover, Del

    2005-01-01

    This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…

  20. USEEIO Satellite Files

    Data.gov (United States)

    U.S. Environmental Protection Agency — These files contain the environmental data as particular emissions or resources associated with a BEA sectors that are used in the USEEIO model. They are organized...

  1. Provider of Services File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The POS file contains data on characteristics of hospitals and other types of healthcare facilities, including the name and address of the facility and the type of...

  2. Closed Claim Query File

    Data.gov (United States)

    Social Security Administration — This file is used to hold information about disability claims that have been closed and have been selected for sampling.Sampling is the process whereby OQR reviews...

  3. National Downloadable File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Physician Compare downloadable file is organized at the individual provider level; each line is unique at the provider/enrollment/organization/address level....

  4. Patient Treatment File (PTF)

    Data.gov (United States)

    Department of Veterans Affairs — This database is part of the National Medical Information System (NMIS). The Patient Treatment File (PTF) contains a record for each inpatient care episode provided...

  5. Download this PDF file

    African Journals Online (AJOL)

    Gbaje E.S

    Information And Communication Technology Literacy Among Academics In Ahmadu Bello University. Zaria. By. Umar Babangida Dangani and Prof. ..... File management and window explorer. Downloading software from the web ..... meeting of the Rural Sociological Society,. Seelbach Hilton Hotel, Louisville, Kentucky.

  6. INTERNET: PENGIRIMAN FILE

    Directory of Open Access Journals (Sweden)

    Zainul Bakri

    2012-10-01

    Full Text Available Salah satu alasan pengguna komputer untuk berhubungan dengan Internet adalah mendapat kesempatan untuk menyalin ('download' informasi yang tersimpan dari server jaringan komputer lain (misalnya menyalin program aplikasi komputer, data mentah, dan sebagainya. File Transfer  Protocol (FfP adalah cara di Internet untuk mengirim file dari satu tempat ke komputer pengguna. Untuk keperluan ini dapat menggunakan program FTP khusus atau dengan menggunakan Web browser.

  7. Medicare program; revisions to payment policies under the physician fee schedule, and other Part B payment policies for CY 2008; revisions to the payment policies of ambulance services under the ambulance fee schedule for CY 2008; and the amendment of the e-prescribing exemption for computer generated facsimile transmissions. Final rule with comment period.

    Science.gov (United States)

    2007-11-27

    This final rule with comment period addresses certain provisions of the Tax Relief and Health Care Act of 2006, as well as making other proposed changes to Medicare Part B payment policy. We are making these changes to ensure that our payment systems are updated to reflect changes in medical practice and the relative value of services. This final rule with comment period also discusses refinements to resource-based practice expense (PE) relative value units (RVUs); geographic practice cost indices (GPCI) changes; malpractice RVUs; requests for additions to the list of telehealth services; several coding issues including additional codes from the 5-Year Review; payment for covered outpatient drugs and biologicals; the competitive acquisition program (CAP); clinical lab fee schedule issues; payment for renal dialysis services; performance standards for independent diagnostic testing facilities; expiration of the physician scarcity area (PSA) bonus payment; conforming and clarifying changes for comprehensive outpatient rehabilitation facilities (CORFs); a process for updating the drug compendia; physician self referral issues; beneficiary signature for ambulance transport services; durable medical equipment (DME) update; the chiropractic services demonstration; a Medicare economic index (MEI) data change; technical corrections; standards and requirements related to therapy services under Medicare Parts A and B; revisions to the ambulance fee schedule; the ambulance inflation factor for CY 2008; and amending the e-prescribing exemption for computer-generated facsimile transmissions. We are also finalizing the calendar year (CY) 2007 interim RVUs and are issuing interim RVUs for new and revised procedure codes for CY 2008. As required by the statute, we are announcing that the physician fee schedule update for CY 2008 is -10.1 percent, the initial estimate for the sustainable growth rate for CY 2008 is -0.1 percent, and the conversion factor (CF) for CY 2008 is $34.0682.

  8. Renewal-anomalous-heterogeneous files

    International Nuclear Information System (INIS)

    Flomenbom, Ophir

    2010-01-01

    Renewal-anomalous-heterogeneous files are solved. A simple file is made of Brownian hard spheres that diffuse stochastically in an effective 1D channel. Generally, Brownian files are heterogeneous: the spheres' diffusion coefficients are distributed and the initial spheres' density is non-uniform. In renewal-anomalous files, the distribution of waiting times for individual jumps is not exponential as in Brownian files, yet obeys: ψ α (t)∼t -1-α , 0 2 >, obeys, 2 >∼ 2 > nrml α , where 2 > nrml is the MSD in the corresponding Brownian file. This scaling is an outcome of an exact relation (derived here) connecting probability density functions of Brownian files and renewal-anomalous files. It is also shown that non-renewal-anomalous files are slower than the corresponding renewal ones.

  9. Cloud object store for archive storage of high performance computing data using decoupling middleware

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2015-06-30

    Cloud object storage is enabled for archived data, such as checkpoints and results, of high performance computing applications using a middleware process. A plurality of archived files, such as checkpoint files and results, generated by a plurality of processes in a parallel computing system are stored by obtaining the plurality of archived files from the parallel computing system; converting the plurality of archived files to objects using a log structured file system middleware process; and providing the objects for storage in a cloud object storage system. The plurality of processes may run, for example, on a plurality of compute nodes. The log structured file system middleware process may be embodied, for example, as a Parallel Log-Structured File System (PLFS). The log structured file system middleware process optionally executes on a burst buffer node.

  10. Cloud object store for checkpoints of high performance computing applications using decoupling middleware

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2016-04-19

    Cloud object storage is enabled for checkpoints of high performance computing applications using a middleware process. A plurality of files, such as checkpoint files, generated by a plurality of processes in a parallel computing system are stored by obtaining said plurality of files from said parallel computing system; converting said plurality of files to objects using a log structured file system middleware process; and providing said objects for storage in a cloud object storage system. The plurality of processes may run, for example, on a plurality of compute nodes. The log structured file system middleware process may be embodied, for example, as a Parallel Log-Structured File System (PLFS). The log structured file system middleware process optionally executes on a burst buffer node.

  11. 76 FR 4867 - Marine Mammals; File No. 15453

    Science.gov (United States)

    2011-01-27

    ... Public Comment'' from the Features box on the Applications and Permits for Protected Species (APPS) home page, https://apps.nmfs.noaa.gov , and then selecting File No. 15453 from the list of available... educational graphics about the Hawaiian monk seal. In compliance with the National Environmental Policy Act of...

  12. Privacy Impact Assessment for the Claims Office Master Files

    Science.gov (United States)

    The Claims Office Master Files System collects information on companies in debt to the EPA. Learn how this data is collected, how it will be used, access to the data, the purpose of data collection, and record retention policies for this data.

  13. Legal, economic and cultural aspects of file sharing

    NARCIS (Netherlands)

    van Eijk, N.; Poort, J.P.; Rutten, P.

    2010-01-01

    This contribution seeks to identify the short and long-term economic and cultural effects of file sharing on music, films and games, while taking into account the legal context and policy developments. The short-term implications examined concern direct costs and benefits to society, whereas the

  14. 12 CFR 363.4 - Filing and notice requirements.

    Science.gov (United States)

    2010-01-01

    ... 363.4 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY ANNUAL INDEPENDENT AUDITS AND REPORTING REQUIREMENTS § 363.4 Filing and notice requirements. (a... independent public accountant's report thereon, a management report, and, if applicable, the independent...

  15. The version control service for the ATLAS data acquisition configuration files

    International Nuclear Information System (INIS)

    Soloviev, Igor

    2012-01-01

    The ATLAS experiment at the LHC in Geneva uses a complex and highly distributed Trigger and Data Acquisition system, involving a very large number of computing nodes and custom modules. The configuration of the system is specified by schema and data in more than 1000 XML files, with various experts responsible for updating the files associated with their components. Maintaining an error free and consistent set of XML files proved a major challenge. Therefore a special service was implemented; to validate any modifications; to check the authorization of anyone trying to modify a file; to record who had made changes, plus when and why; and to provide tools to compare different versions of files and to go back to earlier versions if required. This paper provides details of the implementation and exploitation experience, that may be interesting for other applications using many human-readable files maintained by different people, where consistency of the files and traceability of modifications are key requirements.

  16. LASIP-III, a generalized processor for standard interface files. [For creating binary files from BCD input data and printing binary file data in BCD format (devised for fast reactor physics codes)

    Energy Technology Data Exchange (ETDEWEB)

    Bosler, G.E.; O' Dell, R.D.; Resnik, W.M.

    1976-03-01

    The LASIP-III code was developed for processing Version III standard interface data files which have been specified by the Committee on Computer Code Coordination. This processor performs two distinct tasks, namely, transforming free-field format, BCD data into well-defined binary files and providing for printing and punching data in the binary files. While LASIP-III is exported as a complete free-standing code package, techniques are described for easily separating the processor into two modules, viz., one for creating the binary files and one for printing the files. The two modules can be separated into free-standing codes or they can be incorporated into other codes. Also, the LASIP-III code can be easily expanded for processing additional files, and procedures are described for such an expansion. 2 figures, 8 tables.

  17. Grid collector: An event catalog with automated file management

    International Nuclear Information System (INIS)

    Wu, Kesheng; Zhang, Wei-Ming; Sim, Alexander; Gu, Junmin; Shoshani, Arie

    2003-01-01

    High Energy Nuclear Physics (HENP) experiments such as STAR at BNL and ATLAS at CERN produce large amounts of data that are stored as files on mass storage systems in computer centers. In these files, the basic unit of data is an event. Analysis is typically performed on a selected set of events. The files containing these events have to be located, copied from mass storage systems to disks before analysis, and removed when no longer needed. These file management tasks are tedious and time consuming. Typically, all events contained in the files are read into memory before a selection is made. Since the time to read the events dominate the overall execution time, reading the unwanted event needlessly increases the analysis time. The Grid Collector is a set of software modules that works together to address these two issues. It automates the file management tasks and provides ''direct'' access to the selected events for analyses. It is currently integrated with the STAR analysis framework. The users can select events based on tags, such as, ''production date between March 10 and 20, and the number of charged tracks > 100.'' The Grid Collector locates the files containing relevant events, transfers the files across the Grid if necessary, and delivers the events to the analysis code through the familiar iterators. There has been some research efforts to address the file management issues, the Grid Collector is unique in that it addresses the event access issue together with the file management issues. This makes it more useful to a large variety of users

  18. Grid collector: An event catalog with automated file management

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Zhang, Wei-Ming; Sim, Alexander; Gu, Junmin; Shoshani, Arie

    2003-10-17

    High Energy Nuclear Physics (HENP) experiments such as STAR at BNL and ATLAS at CERN produce large amounts of data that are stored as files on mass storage systems in computer centers. In these files, the basic unit of data is an event. Analysis is typically performed on a selected set of events. The files containing these events have to be located, copied from mass storage systems to disks before analysis, and removed when no longer needed. These file management tasks are tedious and time consuming. Typically, all events contained in the files are read into memory before a selection is made. Since the time to read the events dominate the overall execution time, reading the unwanted event needlessly increases the analysis time. The Grid Collector is a set of software modules that works together to address these two issues. It automates the file management tasks and provides ''direct'' access to the selected events for analyses. It is currently integrated with the STAR analysis framework. The users can select events based on tags, such as, ''production date between March 10 and 20, and the number of charged tracks > 100.'' The Grid Collector locates the files containing relevant events, transfers the files across the Grid if necessary, and delivers the events to the analysis code through the familiar iterators. There has been some research efforts to address the file management issues, the Grid Collector is unique in that it addresses the event access issue together with the file management issues. This makes it more useful to a large variety of users.

  19. DSSTOX MASTER STRUCTURE-INDEX FILE: SDF FILE AND DOCUMENTATION

    Science.gov (United States)

    The DSSTox Master Structure-Index File serves to consolidate, manage, and ensure quality and uniformity of the chemical and substance information spanning all DSSTox Structure Data Files, including those in development but not yet published separately on this website.

  20. Code 672 observational science branch computer networks

    Science.gov (United States)

    Hancock, D. W.; Shirk, H. G.

    1988-01-01

    In general, networking increases productivity due to the speed of transmission, easy access to remote computers, ability to share files, and increased availability of peripherals. Two different networks within the Observational Science Branch are described in detail.

  1. DSSTOX MASTER STRUCTURE-INDEX FILE: SDF FILE AND ...

    Science.gov (United States)

    The DSSTox Master Structure-Index File serves to consolidate, manage, and ensure quality and uniformity of the chemical and substance information spanning all DSSTox Structure Data Files, including those in development but not yet published separately on this website. The DSSTox Master Structure-Index File serves to consolidate, manage, and ensure quality and uniformity of the chemical and substance information spanning all DSSTox Structure Data Files, including those in development but not yet published separately on this website.

  2. Extracting the Data From the LCM vk4 Formatted Output File

    Energy Technology Data Exchange (ETDEWEB)

    Wendelberger, James G. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    These are slides about extracting the data from the LCM vk4 formatted output file. The following is covered: vk4 file produced by Keyence VK Software, custom analysis, no off the shelf way to read the file, reading the binary data in a vk4 file, various offsets in decimal lines, finding the height image data, directly in MATLAB, binary output beginning of height image data, color image information, color image binary data, color image decimal and binary data, MATLAB code to read vk4 file (choose a file, read the file, compute offsets, read optical image, laser optical image, read and compute laser intensity image, read height image, timing, display height image, display laser intensity image, display RGB laser optical images, display RGB optical images, display beginning data and save images to workspace, gamma correction subroutine), reading intensity form the vk4 file, linear in the low range, linear in the high range, gamma correction for vk4 files, computing the gamma intensity correction, observations.

  3. The policies

    International Nuclear Information System (INIS)

    Laruelle, Ph.; Snegaroff, Th.; Moreau, S.; Tellenne, C.; Brunel, S.

    2005-01-01

    Fourth chapter of the book on the geo-policy of the sustainable development, this chapter deal with the different and international policies concerned by the problem. The authors analyze the american energy attitude and policy, the economical equilibrium facing the environmental equilibrium for the european policy, the sanctified and sacrificed nature and the japanese attitude, India and China, the great fear of the 21 century and the sustainable development in Africa. (A.L.B.)

  4. Product identification file

    Energy Technology Data Exchange (ETDEWEB)

    Gray, C.E. (ed.)

    1978-06-01

    This product identification file was compiled as an aid to the industrial hygienist who may encounter the products listed in surveys for and studies of occupational health hazards. It is pointed out that the chemical composition of a product may vary from year to year and some components may be added or deleted without an indication on the label. Some of the data in this file may not be complete depending on the analysis requested. For example, a solvent may be the only component for which the product was analyzed. The file is arranged by listing the chemical manufacturer, followed by the trade name. In cases where no manufacturer is known, the trade name appears in alphabetical order. The log number and the chemist who analyzed the product are listed for reference.

  5. 76 FR 348 - Combined Notice of Filings

    Science.gov (United States)

    2011-01-04

    ... filing per 154.204: Modifications for BGS LINK Implementation Filing to be effective 3/1/2011. Filed Date... Tennessee Natural Gas, LLC submits tariff filing per 154.204: Modifications for BGS LINK Implementation... Storage Company L.L.C. submits tariff filing per 154.204: Modifications for BGS LINK Implementation Filing...

  6. Reliable file sharing in distributed operating system using web RTC

    Science.gov (United States)

    Dukiya, Rajesh

    2017-12-01

    Since, the evolution of distributed operating system, distributed file system is come out to be important part in operating system. P2P is a reliable way in Distributed Operating System for file sharing. It was introduced in 1999, later it became a high research interest topic. Peer to Peer network is a type of network, where peers share network workload and other load related tasks. A P2P network can be a period of time connection, where a bunch of computers connected by a USB (Universal Serial Bus) port to transfer or enable disk sharing i.e. file sharing. Currently P2P requires special network that should be designed in P2P way. Nowadays, there is a big influence of browsers in our life. In this project we are going to study of file sharing mechanism in distributed operating system in web browsers, where we will try to find performance bottlenecks which our research will going to be an improvement in file sharing by performance and scalability in distributed file systems. Additionally, we will discuss the scope of Web Torrent file sharing and free-riding in peer to peer networks.

  7. Download this PDF file

    African Journals Online (AJOL)

    OLUWOLE AKINNAGBE

    Abstract. This paper examined issues pertaining to structures and institutional arrangement for agricultural extension policy. It highlighted the broad objectives of the new policy thrust in agriculture in Nigeria, and identified sub-policies that were expected to facilitate growth of the agricultural sector of the economy.

  8. 48 CFR 239.101 - Policy.

    Science.gov (United States)

    2010-10-01

    .... See Subpart 208.74 when acquiring commercial software or software maintenance. See 227.7202 for policy on the acquisition of commercial computer software and commercial computer software documentation. ...

  9. Xenotransplantation: science, ethics, and public policy

    National Research Council Canada - National Science Library

    Committee on Xenograft, Transplantation Institute; Institute of Medicine

    ... Division of Health Sciences Policy Division of Health Care Services INSTITUTE OF MEDICINE NATIONAL ACADEMY PRESS Washington, D.C. 1996 Copyrightoriginal retained, the be not from cannot book, paper original however, for version formatting, authoritative the typesetting-specific created from the as publication files other XML and from this of recomp...

  10. Xenotransplantation: science, ethics, and public policy

    National Research Council Canada - National Science Library

    Committee on Xenograft, Transplantation Institute

    1996-01-01

    ... Division of Health Sciences Policy Division of Health Care Services INSTITUTE OF MEDICINE NATIONAL ACADEMY PRESS Washington, D.C. 1996 Copyrightoriginal retained, the be not from cannot book, paper original however, for version formatting, authoritative the typesetting-specific created from the as publication files other XML and from this of recomp...

  11. Standard interface files and procedures for reactor physics codes. Version IV

    International Nuclear Information System (INIS)

    O'Dell, R.D.

    1977-09-01

    Standards, procedures, and recommendations of the Committee on Computer Code Coordination for promoting the exchange of reactor physics codes are updated to Version IV status. Standards and procedures covering general programming, program structure, standard interface files, and file management and handling subroutines are included

  12. Shuttle Data Center File-Processing Tool in Java

    Science.gov (United States)

    Barry, Matthew R.; Miller, Walter H.

    2006-01-01

    A Java-language computer program has been written to facilitate mining of data in files in the Shuttle Data Center (SDC) archives. This program can be executed on a variety of workstations or via Web-browser programs. This program is partly similar to prior C-language programs used for the same purpose, while differing from those programs in that it exploits the platform-neutrality of Java in implementing several features that are important for analysis of large sets of time-series data. The program supports regular expression queries of SDC archive files, reads the files, interleaves the time-stamped samples according to a chosen output, then transforms the results into that format. A user can choose among a variety of output file formats that are useful for diverse purposes, including plotting, Markov modeling, multivariate density estimation, and wavelet multiresolution analysis, as well as for playback of data in support of simulation and testing.

  13. Formalizing a Hierarchical File System

    NARCIS (Netherlands)

    Hesselink, Wim H.; Lali, M.I.

    2009-01-01

    In this note, we define an abstract file system as a partial function from (absolute) paths to data. Such a file system determines the set of valid paths. It allows the file system to be read and written at a valid path, and it allows the system to be modified by the Unix operations for removal

  14. Formalizing a hierarchical file system

    NARCIS (Netherlands)

    Hesselink, Wim H.; Lali, Muhammad Ikram

    An abstract file system is defined here as a partial function from (absolute) paths to data. Such a file system determines the set of valid paths. It allows the file system to be read and written at a valid path, and it allows the system to be modified by the Unix operations for creation, removal,

  15. Image files of PCR data plotted on the FACS profiles - Plabrain DB | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available List Contact us Plabrain DB Image files of PCR data plotted on the FACS profiles Data detail Data name Image files of PCR data plotte...s FACS-based single-cell PCR data was plotted on the FACS profile, in which cells are sorted by DNA content ...d License Update History of This Database Site Policy | Contact Us Image files of PCR data plotted on the FACS profiles - Plabrain DB | LSDB Archive ...

  16. Energy taxation and the double dividend effect in Taiwan's energy conservation policy-an empirical study using a computable general equilibrium model

    Energy Technology Data Exchange (ETDEWEB)

    Bor, Yunchang Jeffrey, E-mail: byc2@faculty.pccu.edu.t [Department of Economics, Chinese Culture University, Taipei 11114, Taiwan (China); Huang Yophy [Department of Public Finance and Tax Administration, National Taipei College of Business, Taipei 10051, Taiwan (China)

    2010-05-15

    Faced with pressure from greenhouse gas reductions and energy price hikes, the Taiwan government is in the process of developing an energy tax regime to reflect environmental external costs and effectively curb energy consumption, as well as mitigate CO{sub 2} emissions through an adequate pricing system. This study utilizes a CGE model to simulate and analyze the economic impacts of the draft Energy Tax Bill and its complementary fiscal measures. Under the assumption of tax revenue neutrality, the use of energy tax revenue generated for the purpose of reducing income tax is the best choice with double dividend effects since it will effectively stimulate domestic consumption and investment, and, consequently, mitigate the negative impacts of the distortionary tax regime. The double dividend effect is less significant, however, when the supplementary measures being used are for government expenditure. Nevertheless, all supplementary measures have effectively reduced energy consumption, which means they have delivered at least the first dividend-in the sense of CO{sub 2} emissions control. It has been verified in this study that having adequate public-finance policy measures is the key to realizing the double dividend effect.

  17. Energy taxation and the double dividend effect in Taiwan's energy conservation policy. An empirical study using a computable general equilibrium model

    Energy Technology Data Exchange (ETDEWEB)

    Bor, Yunchang Jeffrey [Department of Economics, Chinese Culture University, Taipei 11114 (China); Huang, Yophy [Department of Public Finance and Tax Administration, National Taipei College of Business, Taipei 10051 (China)

    2010-05-15

    Faced with pressure from greenhouse gas reductions and energy price hikes, the Taiwan government is in the process of developing an energy tax regime to reflect environmental external costs and effectively curb energy consumption, as well as mitigate CO{sub 2} emissions through an adequate pricing system. This study utilizes a CGE model to simulate and analyze the economic impacts of the draft Energy Tax Bill and its complementary fiscal measures. Under the assumption of tax revenue neutrality, the use of energy tax revenue generated for the purpose of reducing income tax is the best choice with double dividend effects since it will effectively stimulate domestic consumption and investment, and, consequently, mitigate the negative impacts of the distortionary tax regime. The double dividend effect is less significant, however, when the supplementary measures being used are for government expenditure. Nevertheless, all supplementary measures have effectively reduced energy consumption, which means they have delivered at least the first dividend - in the sense of CO{sub 2} emissions control. It has been verified in this study that having adequate public-finance policy measures is the key to realizing the double dividend effect. (author)

  18. Energy taxation and the double dividend effect in Taiwan's energy conservation policy-an empirical study using a computable general equilibrium model

    International Nuclear Information System (INIS)

    Bor, Yunchang Jeffrey; Huang Yophy

    2010-01-01

    Faced with pressure from greenhouse gas reductions and energy price hikes, the Taiwan government is in the process of developing an energy tax regime to reflect environmental external costs and effectively curb energy consumption, as well as mitigate CO 2 emissions through an adequate pricing system. This study utilizes a CGE model to simulate and analyze the economic impacts of the draft Energy Tax Bill and its complementary fiscal measures. Under the assumption of tax revenue neutrality, the use of energy tax revenue generated for the purpose of reducing income tax is the best choice with double dividend effects since it will effectively stimulate domestic consumption and investment, and, consequently, mitigate the negative impacts of the distortionary tax regime. The double dividend effect is less significant, however, when the supplementary measures being used are for government expenditure. Nevertheless, all supplementary measures have effectively reduced energy consumption, which means they have delivered at least the first dividend-in the sense of CO 2 emissions control. It has been verified in this study that having adequate public-finance policy measures is the key to realizing the double dividend effect.

  19. A History of the Andrew File System

    CERN Multimedia

    CERN. Geneva; Altman, Jeffrey

    2011-01-01

    Derrick Brashear and Jeffrey Altman will present a technical history of the evolution of Andrew File System starting with the early days of the Andrew Project at Carnegie Mellon through the commercialization by Transarc Corporation and IBM and a decade of OpenAFS. The talk will be technical with a focus on the various decisions and implementation trade-offs that were made over the course of AFS versions 1 through 4, the development of the Distributed Computing Environment Distributed File System (DCE DFS), and the course of the OpenAFS development community. The speakers will also discuss the various AFS branches developed at the University of Michigan, Massachusetts Institute of Technology and Carnegie Mellon University.

  20. File Construction Using FAMULUS.

    Science.gov (United States)

    Pao, Miranda Lee

    1982-01-01

    Describes the use of FAMULUS, a database management system, to teach library science students at Case Western Reserve University indexing, computerized file construction, and online information retrieval. The special features of FAMULUS and their use in course instruction are outlined and evaluated. A 19-item reference list is attached. (Author/JL)

  1. Download this PDF file

    African Journals Online (AJOL)

    USER

    1990s with the advent of digital communications, in particular, the Internet. Before the advent of the. Internet, File Transfer Protocol, Gopher, and the. World Wide Web were used to increase availability of scholarly material by lowering the barriers to distribution, (Registry of Open Access. Repositories, 2011). Open access ...

  2. Download this PDF file

    African Journals Online (AJOL)

    GB

    The structure of financing of healthcare services in Iran is presented in Figure 1. The main part of governmental budget for health in Iran is allocated to primary health care; and money and credits are spent by the Ministry of Health (MoH). Of course the Iranian Health. Insurance Organization (IHIO) is contributing in this filed ...

  3. 11 CFR 100.19 - File, filed or filing (2 U.S.C. 434(a)).

    Science.gov (United States)

    2010-01-01

    ... a facsimile machine or by electronic mail if the reporting entity is not required to file..., including electronic reporting entities, may use the Commission's website's on-line program to file 48-hour... the reporting entity is not required to file electronically in accordance with 11 CFR 104.18. [67 FR...

  4. Perbandingan Kinerja Algoritma Fixed Length Binary Encoding (FLBE) Dengan Variable Length Binary Encoding (VLBE) Dalam Kompresi Text File

    OpenAIRE

    Viliana, Debora

    2014-01-01

    This study aims to design a computer application that can compress text files and compare the performance of the algorithm. Compression is done with a text file using a text encoding algorithms Fixed Length Binary Encoding (FLBE) and Variable Length Binary Encoding algorithm, then do the compression process.The end result are a compression of the file extension *. flbe and *.vlbe which can be decompressed. The output of the decompression is a new file that consists of a file header and body f...

  5. Evaluated neutronic file for indium

    International Nuclear Information System (INIS)

    Smith, A.B.; Chiba, S.; Smith, D.L.; Meadows, J.W.; Guenther, P.T.; Lawson, R.D.; Howerton, R.J.

    1990-01-01

    A comprehensive evaluated neutronic data file for elemental indium is documented. This file, extending from 10 -5 eV to 20 MeV, is presented in the ENDF/B-VI format, and contains all neutron-induced processes necessary for the vast majority of neutronic applications. In addition, an evaluation of the 115 In(n,n') 116m In dosimetry reaction is presented as a separate file. Attention is given in quantitative values, with corresponding uncertainty information. These files have been submitted for consideration as a part of the ENDF/B-VI national evaluated-file system. 144 refs., 10 figs., 4 tabs

  6. Inadequate computer backup process resulting in data loss, US site. Annex II-2

    International Nuclear Information System (INIS)

    2008-01-01

    All the files on a computer should be transferred to a read/write CD during computer exchanges to ensure that files not identified by the user as necessary will be available once the computer has been sanitized. Users should be required to check that the files have been uploaded from the disk, to ensure that they are all present and accessible before former computer drives are sanitized. Computers destined for sanitizing should have all the information on them backed up on a read/write CD, reloaded onto the new computer and verified by the user before the computer is sanitized

  7. Download this PDF file

    African Journals Online (AJOL)

    FIRST LADY

    7. Computer Engineer. Associate. 100 2.50 D. 110. 2.75 D. 8. Computer Engineer Senior. 140 3.50 A. 124. 3.10 A. 9. Computer Graphics. Programmer. 134 3.35 A. 120. 3.00 A. 10 Computer Instructor. 112 2.80 D. 144. 3.60 A. 11 Computer Operations. 106 2.65 D. 144. 3.60 A. African Research Review Vol. 4(3b) July, 2010.

  8. Macroeconomic impact of a mild influenza pandemic and associated policies in Thailand, South Africa and Uganda: a computable general equilibrium analysis.

    Science.gov (United States)

    Smith, Richard D; Keogh-Brown, Marcus R

    2013-11-01

    Previous research has demonstrated the value of macroeconomic analysis of the impact of influenza pandemics. However, previous modelling applications focus on high-income countries and there is a lack of evidence concerning the potential impact of an influenza pandemic on lower- and middle-income countries. To estimate the macroeconomic impact of pandemic influenza in Thailand, South Africa and Uganda with particular reference to pandemic (H1N1) 2009. A single-country whole-economy computable general equilibrium (CGE) model was set up for each of the three countries in question and used to estimate the economic impact of declines in labour attributable to morbidity, mortality and school closure. Overall GDP impacts were less than 1% of GDP for all countries and scenarios. Uganda's losses were proportionally larger than those of Thailand and South Africa. Labour-intensive sectors suffer the largest losses. The economic cost of unavoidable absence in the event of an influenza pandemic could be proportionally larger for low-income countries. The cost of mild pandemics, such as pandemic (H1N1) 2009, appears to be small, but could increase for more severe pandemics and/or pandemics with greater behavioural change and avoidable absence. © 2013 John Wiley & Sons Ltd.

  9. Building sustainable policy framework for transport development: A review of national transport policy initiatives in Nigeria

    Directory of Open Access Journals (Sweden)

    Sumaila A.F.

    2013-06-01

    Full Text Available This paper is concerned with building a sustainable policy framework for transport development in Nigeria. Its objective is to review the country’s transport policy initiatives in order to understand the extent to which it addresses Nigeria’s mobility and transportation problems. From published materials and official government documents and files, the study identifies four national policy initiatives which are reviewed and analysed with regard to their context, contents, and consequences. The study reveals that while the policy initiatives could be said to be adequate and comprehensive in terms of their context and contents, the major challenge is implementation of recommended solutions. The study therefore provides a general checklist to guide policy direction, while advocating for policy-based researches and empirical studies in order to provide the data base for formulation of a sustainable national transport policy for Nigeria.

  10. Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android

    Directory of Open Access Journals (Sweden)

    Siswo Wardoyo

    2016-03-01

    Full Text Available Cryptography is one of the ways used to secure data in the form of a file with encrypt files so that others are not entitled to know the file is private and confidential. One method is the algorithm Blowfish Cryptography which is a symmetric key using the algorithm to perform encryption and decryption. Applications that are built can perform file encryption-shaped images, videos, and documents. These applications can be running on a mobile phone that has a minimal operating system Android version 2.3. The software used to build these applications is Eclipse. The results of this research indicate that applications built capable of performing encryption and decryption. The results file encryption makes files into another unknown meaning. By using the keys numbered 72 bits or 9 character takes 1,49x108 years to break it with the speed it’s computation is 106 key/sec.

  11. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  12. Public Key Infrastructure (PKI) enhanced file transfer over secure ...

    African Journals Online (AJOL)

    user

    Public Key Infrastructure (PKI) provides an intensive security mechanism for securing data communication over network. Generally transferring a file over a network is not secure if the network is wireless network or it consists of hubs as a networking device. Because then packets are broadcasts to every other computers ...

  13. Defining nuclear medical file formal based on DICOM standard

    International Nuclear Information System (INIS)

    He Bin; Jin Yongjie; Li Yulan

    2001-01-01

    With the wide application of computer technology in medical area, DICOM is becoming the standard of digital imaging and communication. The author discusses how to define medical imaging file formal based on DICOM standard. It also introduces the format of ANMIS system the authors defined the validity and integrality of this format

  14. Policy Innovation in Innovation Policy

    DEFF Research Database (Denmark)

    Borras, Susana

    as with national and sub-national governments in Europe, all of them introducing interesting novelties in their innovation policy. These changes refer to different aspects of policy, mainly the content of policy initiatives towards science, technology and innovation; the instruments governments are using...... to achieve their goals; and the actors in the policy system that are being mobilised in pursuing these goals. This paper deals with these policy changes, paying special attention to the novelties introduced since the early 1990s in Europe. The perspective of this paper deals mainly on the changes introduced...... at the EU level, and mentions similar trends taking place at national and sub-national levels. The questions that guide the contents here are essentially three, namely, what are the main traits of innovation policies in Europe since the 1990s and how have the EU and different national governments approached...

  15. Access to DIII-D data located in multiple files and multiple locations

    International Nuclear Information System (INIS)

    McHarg, B.B. Jr.

    1993-10-01

    The General Atomics DIII-D tokamak fusion experiment is now collecting over 80 MB of data per discharge once every 10 min, and that quantity is expected to double within the next year. The size of the data files, even in compressed format, is becoming increasingly difficult to handle. Data is also being acquired now on a variety of UNIX systems as well as MicroVAX and MODCOMP computer systems. The existing computers collect all the data into a single shot file, and this data collection is taking an ever increasing amount of time as the total quantity of data increases. Data is not available to experimenters until it has been collected into the shot file, which is in conflict with the substantial need for data examination on a timely basis between shots. The experimenters are also spread over many different types of computer systems (possibly located at other sites). To improve data availability and handling, software has been developed to allow individual computer systems to create their own shot files locally. The data interface routine PTDATA that is used to access DIII-D data has been modified so that a user's code on any computer can access data from any computer where that data might be located. This data access is transparent to the user. Breaking up the shot file into separate files in multiple locations also impacts software used for data archiving, data management, and data restoration

  16. Computer system operation

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Young Jae; Lee, Hae Cho; Lee, Ho Yeun; Kim, Young Taek; Lee, Sung Kyu; Park, Jeong Suk; Nam, Ji Wha; Kim, Soon Kon; Yang, Sung Un; Sohn, Jae Min; Moon, Soon Sung; Park, Bong Sik; Lee, Byung Heon; Park, Sun Hee; Kim, Jin Hee; Hwang, Hyeoi Sun; Lee, Hee Ja; Hwang, In A. [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1993-12-01

    The report described the operation and the trouble shooting of main computer and KAERINet. The results of the project are as follows; 1. The operation and trouble shooting of the main computer system. (Cyber 170-875, Cyber 960-31, VAX 6320, VAX 11/780). 2. The operation and trouble shooting of the KAERINet. (PC to host connection, host to host connection, file transfer, electronic-mail, X.25, CATV etc.). 3. The development of applications -Electronic Document Approval and Delivery System, Installation the ORACLE Utility Program. 22 tabs., 12 figs. (Author) .new.

  17. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  18. Informed policies

    International Development Research Centre (IDRC) Digital Library (Canada)

    cation technology (ICT) and now. Minister of Science and Technology, was one of the architects of Mozam- bique's ICT policy in 2000 — the first in Africa. Nationwide access to these technologies is one of the pillars of the government's science and technology policy. “We don't believe in politicians, but we believe in politics.

  19. The Fermilab central computing facility architectural model

    International Nuclear Information System (INIS)

    Nicholls, J.

    1989-01-01

    The goal of the current Central Computing Upgrade at Fermilab is to create a computing environment that maximizes total productivity, particularly for high energy physics analysis. The Computing Department and the Next Computer Acquisition Committee decided upon a model which includes five components: an interactive front-end, a Large-Scale Scientific Computer (LSSC, a mainframe computing engine), a microprocessor farm system, a file server, and workstations. With the exception of the file server, all segments of this model are currently in production: a VAX/VMS cluster interactive front-end, an Amdahl VM Computing engine, ACP farms, and (primarily) VMS workstations. This paper will discuss the implementation of the Fermilab Central Computing Facility Architectural Model. Implications for Code Management in such a heterogeneous environment, including issues such as modularity and centrality, will be considered. Special emphasis will be placed on connectivity and communications between the front-end, LSSC, and workstations, as practiced at Fermilab. (orig.)

  20. The Fermilab Central Computing Facility architectural model

    International Nuclear Information System (INIS)

    Nicholls, J.

    1989-05-01

    The goal of the current Central Computing Upgrade at Fermilab is to create a computing environment that maximizes total productivity, particularly for high energy physics analysis. The Computing Department and the Next Computer Acquisition Committee decided upon a model which includes five components: an interactive front end, a Large-Scale Scientific Computer (LSSC, a mainframe computing engine), a microprocessor farm system, a file server, and workstations. With the exception of the file server, all segments of this model are currently in production: a VAX/VMS Cluster interactive front end, an Amdahl VM computing engine, ACP farms, and (primarily) VMS workstations. This presentation will discuss the implementation of the Fermilab Central Computing Facility Architectural Model. Implications for Code Management in such a heterogeneous environment, including issues such as modularity and centrality, will be considered. Special emphasis will be placed on connectivity and communications between the front-end, LSSC, and workstations, as practiced at Fermilab. 2 figs

  1. Grid collector an event catalog with automated file management

    CERN Document Server

    Ke Sheng Wu; Sim, A; Jun Min Gu; Shoshani, A

    2004-01-01

    High Energy Nuclear Physics (HENP) experiments such as STAR at BNL and ATLAS at CERN produce large amounts of data that are stored as files on mass storage systems in computer centers. In these files, the basic unit of data is an event. Analysis is typically performed on a selected set of events. The files containing these events have to be located, copied from mass storage systems to disks before analysis, and removed when no longer needed. These file management tasks are tedious and time consuming. Typically, all events contained in the files are read into memory before a selection is made. Since the time to read the events dominate the overall execution time, reading the unwanted event needlessly increases the analysis time. The Grid Collector is a set of software modules that works together to address these two issues. It automates the file management tasks and provides "direct" access to the selected events for analyses. It is currently integrated with the STAR analysis framework. The users can select ev...

  2. SLIB77, Source Library Data Compression and File Maintenance System

    International Nuclear Information System (INIS)

    Lunsford, A.

    1989-01-01

    Description of program or function: SLIB77 is a source librarian program designed to maintain FORTRAN source code in a compressed form on magnetic disk. The program was prepared to meet program maintenance requirements for ongoing program development and continual improvement of very large programs involving many programmers from a number of different organizations. SLIB77 automatically maintains in one file the source of the current program as well as all previous modifications. Although written originally for FORTRAN programs, SLIB77 is suitable for use with data files, text files, operating systems, and other programming languages, such as Ada, C and COBOL. It can handle libraries with records of up to 160-characters. Records are grouped into DECKS and assigned deck names by the user. SLIB77 assigns a number to each record in each DECK. Records can be deleted or restored singly or as a group within each deck. Modification records are grouped and assigned modification identification names by the user. The program assigns numbers to each new record within the deck. The program has two modes of execution, BATCH and EDIT. The BATCH mode is controlled by an input file and is used to make changes permanent and create new library files. The EDIT mode is controlled by interactive terminal input and a built-in line editor is used for modification of single decks. Transferring of a library from one computer system to another is accomplished using a Portable Library File created by SLIB77 in a BATCH run

  3. Federating LHCb datasets using the DIRAC File catalog

    CERN Document Server

    Haen, Christophe; Frank, Markus; Tsaregorodtsev, Andrei

    2015-01-01

    In the distributed computing model of LHCb the File Catalog (FC) is a central component that keeps track of each file and replica stored on the Grid. It is federating the LHCb data files in a logical namespace used by all LHCb applications. As a replica catalog, it is used for brokering jobs to sites where their input data is meant to be present, but also by jobs for finding alternative replicas if necessary. The LCG File Catalog (LFC) used originally by LHCb and other experiments is now being retired and needs to be replaced. The DIRAC File Catalog (DFC) was developed within the framework of the DIRAC Project and presented during CHEP 2012. From the technical point of view, the code powering the DFC follows an Aspect oriented programming (AOP): each type of entity that is manipulated by the DFC (Users, Files, Replicas, etc) is treated as a separate 'concern' in the AOP terminology. Hence, the database schema can also be adapted to the needs of a Virtual Organization. LHCb opted for a highly tuned MySQL datab...

  4. Download this PDF file

    African Journals Online (AJOL)

    USER

    2015-03-23

    Mar 23, 2015 ... (2003), found little evidence of an impact of either European regional policy or French national policy on location decisions. The authors do find evidence of agglomeration effects that differ by industry and the nationality of the SSI. Guimaraes et al. (2000) investigate the impact of within- industry spillovers ...

  5. Download this PDF file

    African Journals Online (AJOL)

    Mo

    The socio-economic dimensions of smallholder livestock management in Kenya and its effects on competitiveness of .... effective livestock policies that take into account both policy makers and livestock keepers' .... of cattle as security against contingencies and the function of cattle as a means of financing periodic ...

  6. Download this PDF file

    African Journals Online (AJOL)

    CHILD HOMELESSNESS: THE WIDER CONTEXT. Rapid and unsustainable urbanisation in the postcolonial period led to entrenched ur- ban poverty in cities such as Nairobi, Kisumu and Mombasa. In recent decades Structural. Adjustment Policies (SAPs) have 'enforced policies of agricultural deregulation and 'de-.

  7. 78 FR 42148 - Advisory Committee on International Economic Policy; Notice of Open Meeting

    Science.gov (United States)

    2013-07-15

    ...: Gregory Maggio, Office of Economic Policy Analysis and Public Diplomacy, Bureau of Economic and Business..., Office of Economic Policy Analysis and Public Diplomacy. [FR Doc. 2013-16895 Filed 7-12-13; 8:45 am... DEPARTMENT OF STATE [Public Notice 8380] Advisory Committee on International Economic Policy...

  8. PFS: a distributed and customizable file system

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.

    1996-01-01

    In this paper we present our ongoing work on the Pegasus File System (PFS), a distributed and customizable file system that can be used for off-line file system experiments and on-line file system storage. PFS is best described as an object-oriented component library from which either a true file

  9. 4 CFR 28.4 - Computation of time.

    Science.gov (United States)

    2010-01-01

    ... 4 Accounts 1 2010-01-01 2010-01-01 false Computation of time. 28.4 Section 28.4 Accounts... Purpose, General Definitions, and Jurisdiction § 28.4 Computation of time. (a) To compute the number of... period begins to run and the last day for filing shall be included in the computation. When the last day...

  10. 28 March 2014 - Italian Minister of Education, University and Research S. Giannini welcomed by CERN Director-General R. Heuer and Director for Research and Scientific Computing S. Bertolucci in the ATLAS experimental cavern with Former Collaboration Spokesperson F. Gianotti. Signature of the guest book with Belgian State Secretary for the Scientific Policy P. Courard.

    CERN Multimedia

    Gadmer, Jean-Claude

    2014-01-01

    28 March 2014 - Italian Minister of Education, University and Research S. Giannini welcomed by CERN Director-General R. Heuer and Director for Research and Scientific Computing S. Bertolucci in the ATLAS experimental cavern with Former Collaboration Spokesperson F. Gianotti. Signature of the guest book with Belgian State Secretary for the Scientific Policy P. Courard.

  11. Effective Vaccination Policies

    Science.gov (United States)

    2010-03-31

    effective” vaccine can stop the virus spread by causing herd immunity and the disease will die out. Vaccines that have this capability are in the vaccine ...Effective Vaccination Policies L. Shawa, W. Spears∗,b, L. Billingsc, P. Maximd aDepartment of Computer Science, University of Wyoming, Laramie, WY...this study is to develop tools that determine the optimal distribution of a vaccine supply in the model. Using plausible benchmark vaccine allocation

  12. 3rd ICTs and Society Meeting; Paper Session - Inequalities: social, economic, political; Paper 1: Information Society Policies 2.0. A Critical Analysis of the Potential and Pit-falls of Social Computing & Informatics in the Light of E-inclusion

    Directory of Open Access Journals (Sweden)

    Pieter Verdegem

    2010-06-01

    Full Text Available In this paper we reflect on how research and policies can and/or should help in the development of a sustainable information society for all. More specifically, we critically investigate how social computing & informatics can entail both potential and pitfalls, especially with regard to the difficult relationship between digital and social inclusion. First of all, traditional information society policies are scrutinized. Furthermore, we point at the existence of digital inequalities and we reflect briefly on policy intervention on this (e-inclusion. In addition, we also evaluate the raise of social computing & informatics. Finally, attention is given to the challenge of how research can contribute to the participation of all in the information society.

  13. Secure File Allocation and Caching in Large-scale Distributed Systems

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Mei, Alessandro; Jajodia, Sushil

    2012-01-01

    In this paper, we present a file allocation and caching scheme that guarantees high assurance, availability, and load balancing in a large-scale distributed file system that can support dynamic updates of authorization policies. The scheme uses fragmentation and replication to store files with high...... security requirements in a system composed of a majority of low-security servers. We develop mechanisms to fragment files, to allocate them into multiple servers, and to cache them as close as possible to their readers while preserving the security requirement of the files, providing load......-balancing, and reducing delay of read operations. The system offers a trade-off-between performance and security that is dynamically tunable according to the current level of threat. We validate our mechanisms with extensive simulations in an Internet-like network....

  14. Policy stories

    DEFF Research Database (Denmark)

    Ren, Carina Bregnholm; Rasmussen, Rasmus Kjærgaard

    planning and execution and of event outcomes beyond the narrow confines of bed nights and legacies. Second, we introduce policies as an entry point to unlock discussions and manifestations of value and futures which connect to AWG. In order to exemplify the workings of the AWG event in these domains, we...... present three central policy stories from the field. The stories tell of how the event was first interested, then activated and finally evaluated. Besides adding a new understanding to policy-driven events as a locus of value creation, we also argue that the AWG 2016 offer speculative bets for new...

  15. CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

    Directory of Open Access Journals (Sweden)

    Sowmiya Murthy

    2014-10-01

    Full Text Available We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving this goal, we propose a digital signature based authentication scheme with a decentralized architecture for distributed key management with multiple Key Distribution Centers. Homomorphic encryption scheme using Paillier public key cryptosystem is used for encrypting the data that is stored in the cloud. We incorporate a query driven approach for validating the access policies defined by an individual user for his/her data i.e. the access is granted to a requester only if his credentials matches with the hidden access policy. Further, since data is vulnerable to losses or damages due to the vagaries of the network, we propose an automatic retrieval mechanism where lost data is recovered by data replication and file replacement with string matching algorithm. We describe a prototype implementation of our proposed model.

  16. Thesaurus of descriptors for the vertical file system

    Energy Technology Data Exchange (ETDEWEB)

    1977-09-01

    The Thesaurus used for the NYIT Energy Information Center is presented. The center is a comprehensive information service covering every aspect of energy conservation and related technology, including conservation programs and practices, alternative energy systems, energy legislation, and public policy development in the United States and abroad. The Thesaurus includes all subject headings found in the Vertical File as well as other cross referenced terms likely to come to mind when seeking information on a specific energy area.

  17. Development of a script for converting DICOM files to .TXT

    International Nuclear Information System (INIS)

    Abrantes, Marcos E.S.; Oliveira, A.H. de

    2014-01-01

    Background: with the increased use of computer simulation techniques for diagnosis or therapy in patients, the MCNP and SCMS software is being widely used. For use as SCMS data entry interface for the MCNP is necessary to perform transformation of DICOM images to text files. Objective: to produce a semi automatic script conversion DICOM images generated by Computerized Tomography or Magnetic Resonance, for .txt in the IMAGEJ software. Methodology: this study was developed in the IMAGEJ software platform with an Intel Core 2 Duo computer, CPU of 2.00GHz, with 2:00 GB of RAM for 32-bit system. Development of the script was held in a text editor using JAVA language. For script insertion in IMAGEJ the plug in tool of this software was used. After this, a window is open asking for the path of the files that will be read, first and last name of DICOM file to be converted, along with where the new files will be stored. Results: for the manual processing of DICOM conversion to .txt of cerebral computed tomography with 600 images requires a time of about 8 hours. The use of script allows conversion time reduction for 12 minutes. Conclusion: the script used demonstrates DICOM conversion ability to .txt and a significant improvement in time savings in processing

  18. 48 CFR 1523.7001 - Policy.

    Science.gov (United States)

    2010-10-01

    ... other portable computers. (4) PC printers - laser, inkjet or dot matrix (stand-alone or networked). (5) High-speed printers used on a PC network (less than approximately 20 pages per minute). (6) Monitors...) Workstations. (2) File servers. (3) Mainframe equipment. (4) Minicomputers. (5) High-speed printers used with...

  19. Download this PDF file

    African Journals Online (AJOL)

    Faculty of Agricultural Sciences Lautech Ogbomoso

    . (Verbeke and Vackier, 2004) and should be considered when commercial policies are designed (Diez, et al, 2006). This present study however aimed at evaluating the consumer perception and preference of meat types in a University.

  20. Download this PDF file

    African Journals Online (AJOL)

    2017-10-02

    , market effect, cash versus ... they lay the pedestal upon which policy makers take the decision as to whether to set up, change or end an ..... This is because SCT schemes have high operating cost that cover targeting costs ...

  1. Competency Reference for Computer Assisted Drafting.

    Science.gov (United States)

    Oregon State Dept. of Education, Salem. Div. of Vocational Technical Education.

    This guide, developed in Oregon, lists competencies essential for students in computer-assisted drafting (CAD). Competencies are organized in eight categories: computer hardware, file usage and manipulation, basic drafting techniques, mechanical drafting, specialty disciplines, three dimensional drawing/design, plotting/printing, and advanced CAD.…

  2. Earnings Public-Use File, 2006

    Data.gov (United States)

    Social Security Administration — Social Security Administration released Earnings Public-Use File (EPUF) for 2006. File contains earnings information for individuals drawn from a systematic random...

  3. The DNA Files

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-06-09

    The DNA Files is a radio documentary which disseminates genetics information over public radio. The documentaries explore subjects which include the following: How genetics affects society. How human life began and how it evolved. Could new prenatal genetic tests hold the key to disease prevention later in life? Would a national genetic data base sacrifice individual privacy? and Should genes that may lead to the cure for cancer be privately owned? This report serves as a project update for the second quarter of 1998. It includes the spring/summer 1998 newsletter, the winter 1998 newsletter, the program clock, and the latest flyer.

  4. Design and creation of a direct access nuclear data file

    International Nuclear Information System (INIS)

    Charpentier, P.

    1981-06-01

    General considerations on the structure of instructions and files are reviewed. Design, organization and mode of use of the different files: instruction file, index files, inverted files, automatic analysis and inquiry programs are examined [fr

  5. Fast processing the film data file

    International Nuclear Information System (INIS)

    Abramov, B.M.; Avdeev, N.F.; Artemov, A.V.

    1978-01-01

    The problems of processing images obtained from three-meter magnetic spectrometer on a new PSP-2 automatic device are considered. A detailed description of the filtration program, which controls the correctness of operation connection line, as well as of scanning parameters and technical quality of information. The filtration process can be subdivided into the following main stages: search of fiducial marks binding of track to fiducial marks; plotting from sparks of track fragments in chambers. For filtration purposes the BESM-6 computer has been chosen. The complex of filtration programs is shaped as a RAM-file, the required version of the program is collected by the PATCHY program. The subprograms, performing the greater part of the calculations are written in the autocode MADLEN, the rest of the subprograms - in FORTRAN and ALGOL. The filtration time for one image makes 1,2-2 s of the calculation. The BESM-6 computer processes up to 12 thousand images a day

  6. Translating mainframe computer data to spreadsheet format.

    Science.gov (United States)

    Burnakis, T G

    1991-12-01

    The translation of mainframe-stored information in ASCII into spreadsheet format for use in Lotus 1-2-3 is explained. Details are presented on how to use the Data Parse command to create a translation template that tells Lotus 1-2-3 how to interpret a file written in ASCII. Lotus 1-2-3 can also translate some files in formats other than ASCII. It can translate files in the Data Interchange Format directly into its own format. Translating mainframe computer data into spreadsheet format is relatively simple and obviates the rekeying of those data.

  7. The European fusion file project

    International Nuclear Information System (INIS)

    Gruppelaar, H.

    1989-01-01

    The European Fusion File (EFF) is a nuclear data file for application in fusion-reactor blanket design calculations, in particular for neutron and photon transport calculations of the Next European Torus (NET). This paper presents the main objectives of the programme for the period 1989 to 1991

  8. Teaching, Learning, and Collaborating in the Cloud: Applications of Cloud Computing for Educators in Post-Secondary Institutions

    Science.gov (United States)

    Aaron, Lynn S.; Roche, Catherine M.

    2012-01-01

    "Cloud computing" refers to the use of computing resources on the Internet instead of on individual personal computers. The field is expanding and has significant potential value for educators. This is discussed with a focus on four main functions: file storage, file synchronization, document creation, and collaboration--each of which has…

  9. Download this PDF file

    African Journals Online (AJOL)

    2004-10-17

    Oct 17, 2004 ... A ranking and scaling (RASC) computer programme for zonation and normality testing of paleontological events was employed to ..... RASC computer programme comprises the observed The zone is recognized in AGP-10 well at a depth sequence of .... Late Miocene Deep Sea Drilling Projects. (DSDP) ...

  10. Download this PDF file

    African Journals Online (AJOL)

    USER

    Stroh et al, (2009) defined “cloud computing as “the computing software and services that can be accessed .... community power and improve library automation. With these challenges facing automation of library .... systems making it hard to integrate them into external services. This makes it possible to integrate two.

  11. Download this PDF file

    African Journals Online (AJOL)

    Department of Computer Science and Engineering, Obafemi Awolowo University, Ile-Ife, Nigeria. (Submitted: 22 April 2004; Accepted: 31 .... This is the type of virus that corrupts the Boot Sector of the disk by the modification technique (Gordon, ..... Computers and Security,. Elsevier Press, December 1995. Hanau, 2000.

  12. Download this PDF file

    African Journals Online (AJOL)

    De Don

    solving abilities using artificial intelligence and other advanced computer-science techniques. Automata helps in the computation of partial functions from p• to R • for some alphabets P and R. Automata usually get inputs on a linear tape. In this paper, areas of fonnal grammars, which have closed relationships to abstract ...

  13. Download this PDF file

    African Journals Online (AJOL)

    Informatics, which entail using the computer to access information by facilitating the formation of ... Database services and computer networks have certainly made available to us a great variety of information sources. A veterinarian by virtue of the training is equipped ..... are Microsoft Excel and Microsoft Access. Other less ...

  14. Download this PDF file

    African Journals Online (AJOL)

    2007-08-02

    Aug 2, 2007 ... nonical technique involves the computation of. Eigen values and Eigen vectors as well as the canonical correlation coefficients. The computed. Eigen value was 2.492 and the canonical correla- tion coefficient was as high as 0.845. These pa- rameters were tested for their significance using. Wilk's lambda ...

  15. ChemEngine: harvesting 3D chemical structures of supplementary data from PDF files.

    Science.gov (United States)

    Karthikeyan, Muthukumarasamy; Vyas, Renu

    2016-01-01

    Digital access to chemical journals resulted in a vast array of molecular information that is now available in the supplementary material files in PDF format. However, extracting this molecular information, generally from a PDF document format is a daunting task. Here we present an approach to harvest 3D molecular data from the supporting information of scientific research articles that are normally available from publisher's resources. In order to demonstrate the feasibility of extracting truly computable molecules from PDF file formats in a fast and efficient manner, we have developed a Java based application, namely ChemEngine. This program recognizes textual patterns from the supplementary data and generates standard molecular structure data (bond matrix, atomic coordinates) that can be subjected to a multitude of computational processes automatically. The methodology has been demonstrated via several case studies on different formats of coordinates data stored in supplementary information files, wherein ChemEngine selectively harvested the atomic coordinates and interpreted them as molecules with high accuracy. The reusability of extracted molecular coordinate data was demonstrated by computing Single Point Energies that were in close agreement with the original computed data provided with the articles. It is envisaged that the methodology will enable large scale conversion of molecular information from supplementary files available in the PDF format into a collection of ready- to- compute molecular data to create an automated workflow for advanced computational processes. Software along with source codes and instructions available at https://sourceforge.net/projects/chemengine/files/?source=navbar.Graphical abstract.

  16. Input data requirements for special processors in the computation system containing the VENTURE neutronics code

    International Nuclear Information System (INIS)

    Vondy, D.R.; Fowler, T.B.; Cunningham, G.W.

    1979-07-01

    User input data requirements are presented for certain special processors in a nuclear reactor computation system. These processors generally read data in formatted form and generate binary interface data files. Some data processing is done to convert from the user oriented form to the interface file forms. The VENTURE diffusion theory neutronics code and other computation modules in this system use the interface data files which are generated

  17. Policy Reader

    International Nuclear Information System (INIS)

    1985-09-01

    This policy reader comprises: Correspondence; Memorandum of Understanding between the US Department of Transportation and the US Department of Energy for the Transportation of Radioactive Materials under the Nuclear Waste Policy Act; Internal Guidelines for Interactions with Communities and Local Governments; Statement by Ben C. Rusche before the Committee on Interior and Insular Affairs, Subcommittee on Energy and the Environment, US House of Representatives, September 13, 1985; Speech presented by Ben C. Rusche before the ANS/CNS/AESJ/ENS Topical Meeting, Pasco, Washington, September 24, 1985 - ''Status of the United States' High-Level Nuclear Waste Disposal Program''; and ''DOE Seeks Comments on Nuclear Transportation Planning,'' DOE News, September 30, 1985

  18. Population policy.

    Science.gov (United States)

    1987-03-01

    Participants in the Seminar on Population Policies for Top-level Policy Makers and Program Managers, meeting in Thailand during January 1987, examined the challenges now facing them regarding the implementation of fertility regulation programs in their respective countries -- Bangladesh, China, India, Indonesia, Malaysia, Nepal, Pakistan, the Philippines, the Republic of Korea, and Thailand. This Seminar was organized to coincide with the completion of an Economic and Social Commission for Asia and the Pacific (ESCAP) study investigating the impact and efficiency of family planning programs in the region. Country studies were reviewed at the Seminar along with policy issues about the status of women, incentive and disincentive programs, and socioeconomic factors affecting fertility. In Bangladesh the government recognizes population growth as its top priority problem related to the socioeconomic development of the country and is working to promote a reorientation strategy from the previous clinic-oriented to a multidimensional family welfare program. China's family planning program seeks to postpone marraige, space the births of children between 3-5 years, and promote the 1-child family. Its goal is to reduce the rate of natural increase from 12/1000 in 1978 to 5/1000 by 1985 and 0 by 2000. India's 7th Five-Year-Plan (1986-90) calls for establishing a 2-child family norm by 2000. In Indonesia the government's population policy includes reducing the rate of population growth, achieving a redistribution of the population, adjusting economic factors, and creating prosperous families. The government of Indonesia reversed its policy to reduce the population growth rate in 1984 and announced its goal of achieving a population of 70 million by 2100 in order to support mass consumption industries. It has created an income tax deduction system favoring large families and maternity benefits for women who have up to 5 children as incentives. Nepal's official policy is to

  19. Language Policy

    DEFF Research Database (Denmark)

    Lauridsen, Karen M.

    2008-01-01

    Like any other text, instructive texts function within a given cultural and situational setting and may only be available in one language. However, the end users may not be familiar with that language and therefore unable to read and understand the instructions. This article therefore argues...... that instructive texts should always be available in a language that is understood by the end users, and that a corporate communication policy which includes a language policy should ensure that this is in fact the case for all instructive texts....

  20. Cloud Computing for Schools

    OpenAIRE

    O'Doherty, Shane

    2010-01-01

    This project evaluates previous Information and Communication Technology policy and practice relating to primary schools in Ireland with a view to suggesting a better way forward in light of advances in ICT, such as the availability of fast broadband services, including fibre broadband, browser-based applications and the advent of cloud computing. Cloud computing refers to the Internet as a source of both software programs and also data retention, in effect the Internet provides the software ...

  1. Evolutionary computation for reinforcement learning

    NARCIS (Netherlands)

    Whiteson, S.; Wiering, M.; van Otterlo, M.

    2012-01-01

    Algorithms for evolutionary computation, which simulate the process of natural selection to solve optimization problems, are an effective tool for discovering high-performing reinforcement-learning policies. Because they can automatically find good representations, handle continuous action spaces,

  2. Worries Over Computer "Viruses" Lead Campuses to Issue Guidelines.

    Science.gov (United States)

    Turner, Judith Axler

    1987-01-01

    Computer viruses are programs that propagate themselves from disk to disk and destroy programs or information files. Several universities have recently reported virus outbreaks. Some suggestions for avoiding the viruses are provided. (MLW)

  3. 77 FR 20810 - Combined Notice of Filings

    Science.gov (United States)

    2012-04-06

    ...: Big Sandy-EQT Capacity Release Waiver Request to be effective N/A. Filed Date: 3/30/12. Accession... and Sales Report of Rockies Express Pipeline LLC. Filed Date: 3/30/12. Accession Number: 20120330-5140.... Description: QEP 37657-15 Amendment to Negotiated Rate Agreement filing to be effective 4/1/2012. Filed Date...

  4. 78 FR 9684 - Combined Notice of Filings

    Science.gov (United States)

    2013-02-11

    ..., LLC. Description: Big Sandy Fuel Filing effective 3-1-13. Filed Date: 1/31/13. Accession Number... LLC. Description: Penalty Revenue Crediting Report of Midcontinent Express Pipeline LLC. Filed Date: 1... Morgan Louisiana Pipeline LLC. Filed Date: 1/31/13. Accession Number: 20130131-5042. Comments Due: 5 p.m...

  5. 76 FR 46788 - Combined Notice of Filings

    Science.gov (United States)

    2011-08-03

    ... submits tariff filing per 154.204: IT Contract Terms to be effective 8/15/2011. Filed Date: 07/22/2011..., 2011. Docket Numbers: RP11-2291-000. Applicants: Midcontinent Express Pipeline LLC. Description: Midcontinent Express Pipeline LLC submits tariff filing per 154.204: Filing to Remove Expired Agreement and...

  6. 12 CFR 16.33 - Filing fees.

    Science.gov (United States)

    2010-01-01

    ... Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY SECURITIES OFFERING DISCLOSURE RULES § 16.33 Filing fees. (a) Filing fees must accompany certain filings made under the provisions of this part... Comptroller of the Currency Fees published pursuant to § 8.8 of this chapter. (b) Filing fees must be paid by...

  7. Root canal transportation with a Ni-Ti rotary file system and stainless steel hand files in simulated root canals.

    Science.gov (United States)

    Loizides, Alexios; Eliopoulos, Dimitris; Kontakiotis, Evangelos

    2006-05-01

    The purpose of this study was to compare the root canal transportation of the crown-down technique performed with the Ni-Ti rotary ProFile system (Dentsply/Maillefer), with the step-back technique using stainless steel K-Flexofiles (Dentsply/Maillefer). Thirty simulated root canals in resin blocks were equally divided into 2 groups. The first group was instrumented with the ProFile system in a crown-down technique and the second group with hand K-Flexofiles in a step-back technique. After instrumentation, resin blocks of both groups were scanned by a transparency scanner, and the derived images were superimposed with the scanned image of an uninstrumented block. Transportation was digitally calculated by a computer software, and results were statistically evaluated by Student t test. Statistically significant differences (P < .05) were found among the 2 groups at 1, 2, 4, 5, and 6 mm from the apical foramen. No statistically significant difference was detected at 3 mm from the apical foramen. ProFile caused less transportation at 1 and 2 mm from the apex, whereas at 3 mm, both instrumentation techniques caused the same transportation. Standard deviation was less in the ProFile group than in the hand file group, indicating a more standardized preparation.

  8. A lightweight high availability strategy for Atlas LCG File Catalogs

    International Nuclear Information System (INIS)

    Martelli, Barbara; Salvo, Alessandro de; Anzellotti, Daniela; Rinaldi, Lorenzo; Cavalli, Alessandro; Pra, Stefano dal; Dell'Agnello, Luca; Gregori, Daniele; Prosperini, Andrea; Ricci, Pier Paolo; Sapunenko, Vladimir

    2010-01-01

    The LCG File Catalog is a key component of the LHC Computing Grid middleware [1], as it contains the mapping between Logical File Names and Physical File Names on the Grid. The Atlas computing model foresees multiple local LFC housed in each Tier-1 and Tier-0, containing all information about files stored in the regional cloud. As the local LFC contents are presently not replicated anywhere, this turns out in a dangerous single point of failure for all of the Atlas regional clouds. In order to solve this problem we propose a novel solution for high availability (HA) of Oracle based Grid services, obtained by composing an Oracle Data Guard deployment and a series of application level scripts. This approach has the advantage of being very easy to deploy and maintain, and represents a good candidate solution for all Tier-2s which are usually little centres with little manpower dedicated to service operations. We also present the results of a wide range of functionality and performance tests run on a test-bed having characteristics similar to the ones required for production. The test-bed consists of a failover deployment between the Italian LHC Tier-1 (INFN - CNAF) and an Atlas Tier-2 located at INFN - Roma1. Moreover, we explain how the proposed strategy can be deployed on the present Grid infrastructure, without requiring any change to the middleware and in a way that is totally transparent to end users and applications.

  9. P2P Evolution: from file-sharing to decentralized workflows

    NARCIS (Netherlands)

    Risse, Thomas; Knezevic, Predrag; Wombacher, Andreas

    Peer-to-peer (P2P) computing is currently receiving a great deal of attention. Much of the current attention is focused on the use of P2P computing for exchanging media files. But P2P systems have actually been around for a long time and many application scenarios exist. In this paper we discuss on

  10. Download this PDF file

    African Journals Online (AJOL)

    approaches to literacy and consider how the findings of recent research into the nature of the relationship between ... Educational practices and language policies in South Africa are such that leamers commence their ... as linguistics, social psychology, cultural anthropology and education has resulted In a body of literature ...

  11. Download this PDF file

    African Journals Online (AJOL)

    industry development policies. money, open and effective competition,. The Act recognises the Public ... with the government of Switzerland to which procurement outcomes are justified as develop sustainable ... stimulate and promote local manufacturing process is the late passage of the annual and production capacities ...

  12. Download this PDF file

    African Journals Online (AJOL)

    Fr. Ikenga

    a bribe. It is also abused when private agent actively offers bribe to circumvent public policies and processes for competitive advantage and profit. Public office can also be abused for personal benefit even if no bribery occurs, through patronage and nepotism .... other acts in breach of the prescribed ethics for public officers.

  13. Download this PDF file

    African Journals Online (AJOL)

    Dr Kazungu

    Adejumo O. Oluwabunmi13. Abstract. A major development issue in Nigeria is unemployment, despite a plethora of economic policies to guide labour absorption and utilisation in the country. Some major reasons for this unemployment challenges have been hinged on the level of human capital development as.

  14. Download this PDF file

    African Journals Online (AJOL)

    Bulelwa Ngoma (MA Psychology) is a researcher at the Centre for Health Policy. Her areas of research include: understanding ... Letter by Nokuzola Mfiki: 'I can no longer continue with life. This community is laughing at me, ...... life stories of women living with HIV/AIDS in Khayelitsha. CSSR Working. Paper. Cape Town ...

  15. Download this PDF file

    African Journals Online (AJOL)

    CJN

    2009-12-15

    Dec 15, 2009 ... This case deals with several aspects of the general principles of contract, the influence of the constitutional values of dignity and equality as regards public policy on the validity of contracts, error, cancellation of contracts and the unethical conduct of an attorney who found himself in a conflict of interests ...

  16. Download this PDF file

    African Journals Online (AJOL)

    provide reasonable assurance in the form of an audit opinion or conclusion'. The phasing in period would involve a 'review of the policies, systems, processes and procedures for the managing of and reporting on performance against predetermined objectives'. During the phasing in period the AG would not provide a.

  17. Download this PDF file

    African Journals Online (AJOL)

    Marketing Performance in a Liberalised. Economy: The case of Mbeya and Iringa . region, Tanzania. MSc thesis, Sokoine. University of' Agriculture, Morogoro,. Tanzania, 168pp: Mullins, R. 1995. A market policy and market development: . A comparison of dairy product consumption in Mombasa, Kenya and Dar es Salaam, ...

  18. Download this PDF file

    African Journals Online (AJOL)

    It has been defined as “aggressive and schoolyard fights, bullying and drug abuse” . violent behaviours committed in schools and However, school violence is not just among during school-based activities and institutional students but it may also involve teachers, violence perpetrated by iatrogenic policies and parents and ...

  19. Download this PDF file

    African Journals Online (AJOL)

    GB

    religious, bad experience in health facilities, good outcome in previous ... the United States and in Thailand, among many others, have also ..... 5. Federal Democratic Republic of Ethiopia. Ministry of Health Health and Health Related. Indicators 2010/2011). Policy planning directorate. www.moh.gov.et. 6. World Health ...

  20. Download this PDF file

    African Journals Online (AJOL)

    SEGUN ADENIJI

    antenatal care (ANC) attendance. An informed consent policy and an education campaign are needed to reduce fears and maximise uptake and .... This trust in modern medicine alongside religion and witchcraft suggests. 'medical pluralism'. ...... results of a study in Cuba, Thailand, Saudi. Arabia and Argentina. BMC Public ...

  1. Download this PDF file

    African Journals Online (AJOL)

    NESG PUBLICATIONS

    The emergence of China and India - two fast-growing giants on the global economic stage - has been the subject of much discussion at international fora, business and policy circles. The same is true for scholars of the international trading system – knowledge about where these giants came from and suggestions about ...

  2. Download this PDF file

    African Journals Online (AJOL)

    Test

    The Action Against Hunger International Network has a policy research and advocacy department called Hunger Watch which concerns itself with current food crises. This book is part of the Hunger Watch series of publications. The focus is on cyclical seasonal hunger, which is a greatly neglected part of the hunger ...

  3. Download this PDF file

    African Journals Online (AJOL)

    Resistance to erythromycin was found in 5% of isolates from all population groups. Strains from all population groups were susceptible to ceftriaxone, cefuroxime, spectinomycin, norfloxacin and ciprofloxacin. The susceptibility of all isolates to spectinomycin observed supports the policy decision to change from ...

  4. Download this PDF file

    African Journals Online (AJOL)

    The conceptualisation and definition of organised crime is contentious. Researchers, policy makers, law enforcement bodies and the judiciary have all used a variety ..... While globalisation is touted as a cause of organised crime and transnational organised crime, one of. South Africa's success stories over the last 20 years.

  5. Download this PDF file

    African Journals Online (AJOL)

    User

    residents and improve residency training on a state / national level. This study assesses the stress level, intimidation/harrasement and well-being of resident doctors in a Nigerian teaching hospital. 3. The outcome will not only be important in planning future health policies concerning Postgraduate Medical Education.

  6. Download this PDF file

    African Journals Online (AJOL)

    Eight to twelve hour old bamboo juice (locally known as 'Ulanzi') was filtered, pasteurized and canned. Samples were sent to Tanzania Bureau of ... town on the road to Mbeya. The juice was allowed to ferment naturally for 8 to 12 .... county, Zhejiang province, Peoples'. Republic of China. Forest Policy and. Economics ...

  7. Download this PDF file

    African Journals Online (AJOL)

    ABEOLUGBENGAS

    Objective: Immunization is one of the most cost-effective public health intervention as it saves millions of lives annually ... vaccine-preventable disease annually hence, the need to determine the perception and the factors ... policy to ensure nursing mothers are permitted to take their children for immunization during working.

  8. Download this PDF file

    African Journals Online (AJOL)

    OLAWUYI

    mechanisms for realizing a viable economic and monetary union in the light of the present realities. The thesis of this paper is ... (FTAs) to a more centrally organized Economic and Monetary Policy formation within a Custom ...... developing countries like Malaysia and other Asian tigers, who through adoption of deliberate ...

  9. Download this PDF file

    African Journals Online (AJOL)

    Administrator

    AIM: - The purpose of this paper is to review the Nigerian sex education program and national policies guiding adolescent sexuality in view of current evidence. It explores the need for comprehensive sexuality education for. Nigerian adolescents beyond the ABC approach and identifies possible implementation gaps.

  10. Download this PDF file

    African Journals Online (AJOL)

    francis

    included people who grew up in English speaking countries who did not speak French. (Samuelson and Freedman, 2010). In 2008, the government made a major language shift in the education system. Thus, a new policy was hastily set up requiring teachers and learners, from primary four to tertiary level, to use English as ...

  11. Download this PDF file

    African Journals Online (AJOL)

    FEN

    Department of Educational Administration and Policy Studies. Delta State University, Abraka, ... Staff in this study comprises the teaching staff called teachers and the non- teaching staff called supportive staff. .... to work things out for themselves with organizational demands minimized. Here authority is delegated while the ...

  12. Download this PDF file

    African Journals Online (AJOL)

    user

    Abstract. The fact that slavery and colonialism are two inhuman policies that plagued the African people's culture with indelible and irreparable consequences is not a debatable issue. While reparations are being demanded by African nationalists from the Western European and United States of America, with focus.

  13. Download this PDF file

    African Journals Online (AJOL)

    REGINALDS

    In this article, I use case studies from some African countries to determine whether or not African climate ... establishment in 1988, the IPCC has produced five major assessment reports in 1990,. 1995, 2001, 2007 and ..... participants in the design and implementation of environmental and climate policies in these countries.

  14. Download this PDF file

    African Journals Online (AJOL)

    RAYAN_

    of Sustainable Development Law and Policy – a Special Issue on Investment and Governance of Africa's ... 5 per cent (or more) GDP growth per annum over the last decade, this has not translated into a significant ... heights, the opacity of the governance systems that manage how revenue is generated, allocated, and used, ...

  15. Download this PDF file

    African Journals Online (AJOL)

    Will Nigeria tread the path of Economic Recovery and Growth in 2017? NESG Research. Abstract. In 2016, the Nigerian .... effects on government revenue or the shift in economic indicators. But in 2017 and the global monetary policy ... investors and competing for investment currently imported flows. Produce goods for the ...

  16. Download this PDF file

    African Journals Online (AJOL)

    11495

    education system. Elliot M. Mncwango. 1. Department of Linguistics, University of Zululand emncwan@pan.uzulu.ac.za. The current status of indigenous ... The Language-in-Education Policy (2004) is cited as an ideal, the goals of ..... The Dilemma of the Mother Tongue: Prospects for Bilingual Education in South Africa.

  17. Download this PDF file

    African Journals Online (AJOL)

    User

    changing demands of increasing population (Moshen,. 1999). Studies of rates, extents, patterns, causes and implications of land use and land cover dynamics at local level can help to design appropriate land management practices, strategies and policies. But evaluation of land use and land cover dynamics at this level is ...

  18. Download this PDF file

    African Journals Online (AJOL)

    aimed at reducing levels of risky drinking and the high burden of alcohol-related harm in African countries. ... Corresponding author: Michael Roerecke, Social, Prevention and Health Policy Research Department, Centre for Addiction and Mental Heath, 33 Russell ... America, psychoactive substance use (especially alcohol) ...

  19. Download this PDF file

    African Journals Online (AJOL)

    USER

    and below admitted into the children emergency unit without primary diagnosis of malnutrition. Consenting subjects over a one year period ... Dept of Paediatrics, Jos University Teaching Hospital Jos, Jos Nigeria. Corresponding Author. Dr C. John Mbbs, ..... POLICY Project/Nigeria. Child Survival in. Nigeria: Situation ...

  20. Download this PDF file

    African Journals Online (AJOL)

    The Cape's policy of the franchise for all civilised men in prin- ciple was colour blind. In Natal the more conservative White minority had effectively kept the franchise from all but six Black potential voters despite official rhetoric about a colour blind property-owners franchise. The concen- tration camps cast light on an aspect ...

  1. Download this PDF file

    African Journals Online (AJOL)

    fellow at the Centre for Gender and Social Policy Studies, Obafemi Awolowo University, Ile-Ife and currently teaches medical sociology in the Department of Sociology and ... membre de famille qui est séropositif cependant il n'ya Presque pas de rapport entre ces variables et l'image qu'ils ont du VIH/. SIDA. On a donc ...

  2. Download this PDF file

    African Journals Online (AJOL)

    Ayodele Azeez A

    Crowded housing is one of the housing stresses that bother policy makers and housing authorities in Lagos, Nigeria. At the core of the argument is the anthropology of proper and acceptable sleeping arrangements, particularly as it applies to households' ethnic and cultural groups. The study examined the crowding levels ...

  3. Download this PDF file

    African Journals Online (AJOL)

    PROF. EZECHUKWU

    2014-03-16

    Mar 16, 2014 ... healthcare provider, but still opts to leave, and sign rele- ... consent6. Factors that could predict the likelihood of leaving hospital AMA could be either facility-related or patient-related7,8. The former include site, structure, in- stitutional policy, quality ... ceptions and attitudes regarding illness and treatment, as.

  4. Download this PDF file

    African Journals Online (AJOL)

    The policy guidelines for oral health in Tanzania (2002) were developed to minimise the impact of diseases ... health. For example gum disease is associated with general health conditions such as heart diseases and diabetes. Dental caries affects between 25-55% of the .... personnel should move out of the dental clinics.

  5. Download this PDF file

    African Journals Online (AJOL)

    the aggregated domestic prices, and other relevant parameters of four selected export commodities indicated that ... Nigerian trade and price policies did not help to offset the deteriorating position of agricultural tradable. ... strategy is a trade strategy, which encourages production for exports and in which there is no bias of ...

  6. Download this PDF file

    African Journals Online (AJOL)

    Kirstam

    2014-07-02

    Jul 2, 2014 ... significance of these increasing engagements continue to be debated in the media, academic and policy circles, both ... Asia and Africa. Specifically, in the area of agricultural development, China in particular has been presented as a success story which can be shared with African countries to support their ...

  7. Download this PDF file

    African Journals Online (AJOL)

    Andries du Toit

    policy debate on the South African economy was characterised as a dual economy, a. “first” and “second” ... informal economy have been developed through collaborative work with Caroline Skinner. 1 Leibbrandt et al ...... differently from one another whilst sharing some determinants in common. The specific features of the ...

  8. Download this PDF file

    African Journals Online (AJOL)

    Petra

    autonomy. The mandates of the regional states are: ensuring self-government and the continuance of the democratic order based on the rule of law; exercising responsibility for socio-economic development policies; policing and public security on the state level; levying and collecting the regional taxes; and managing the.

  9. Download this PDF file

    African Journals Online (AJOL)

    EliasN

    least a drastic revision in their policies” as a result of “the period of the flourishing of globalization” and the resultant disillusionment. 45. 42 Ha-Joon Chang (2011), “Reply to the comments on 'Institutions and Economic. Development: Theory, Policy and History' ”, Journal of Institutional Economics. (2011), Volume 7: 4, p.

  10. Kepler Data Validation Time Series File: Description of File Format and Content

    Science.gov (United States)

    Mullally, Susan E.

    2016-01-01

    The Kepler space mission searches its time series data for periodic, transit-like signatures. The ephemerides of these events, called Threshold Crossing Events (TCEs), are reported in the TCE tables at the NASA Exoplanet Archive (NExScI). Those TCEs are then further evaluated to create planet candidates and populate the Kepler Objects of Interest (KOI) table, also hosted at the Exoplanet Archive. The search, evaluation and export of TCEs is performed by two pipeline modules, TPS (Transit Planet Search) and DV (Data Validation). TPS searches for the strongest, believable signal and then sends that information to DV to fit a transit model, compute various statistics, and remove the transit events so that the light curve can be searched for other TCEs. More on how this search is done and on the creation of the TCE table can be found in Tenenbaum et al. (2012), Seader et al. (2015), Jenkins (2002). For each star with at least one TCE, the pipeline exports a file that contains the light curves used by TPS and DV to find and evaluate the TCE(s). This document describes the content of these DV time series files, and this introduction provides a bit of context for how the data in these files are used by the pipeline.

  11. Buttons, Computers and Data Base: Integrating Computers into Science Programs Using AppleWorks.

    Science.gov (United States)

    Schlenker, Richard M.

    This document suggests that the activity described can be used from kindergarten through adulthood. The activity involves measuring, counting, categorizing, group processes, construction of computer data base files, construction and/or use of data tables, data gathering, making observations, the study of shape, the computation of area, the…

  12. Download this PDF file

    African Journals Online (AJOL)

    2005-07-25

    Submitted: 25 ... In Onumanyi and Ortiz (1982), a computationally efficient and general error estimation technique of the tau method for ..... Numerical. Treatment of Differential Equations in Applications, Lecture Notes in Math.

  13. 77 FR 38610 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2012-06-28

    ... verification records from its DMDC and DEERS data bases to ED's Central Processing System files (Federal... Privacy Act of 1974; Computer Matching Program AGENCY: Department of Education. ACTION: Notice--Computer... document provides notice of the continuation of the computer matching program between the Departments of...

  14. 12 CFR 204.4 - Computation of required reserves.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 2 2010-01-01 2010-01-01 false Computation of required reserves. 204.4 Section... RESERVE REQUIREMENTS OF DEPOSITORY INSTITUTIONS (REGULATION D) § 204.4 Computation of required reserves... liabilities during a 14-day computation period ending every second Monday. (e) For institutions that file a...

  15. Database organization for computer-aided characterization of laser diode

    International Nuclear Information System (INIS)

    Oyedokun, Z.O.

    1988-01-01

    Computer-aided data logging involves a huge amount of data which must be properly managed for optimized storage space, easy access, retrieval and utilization. An organization method is developed to enhance the advantages of computer-based data logging of the testing of the semiconductor injection laser which optimize storage space, permit authorized user easy access and inhibits penetration. This method is based on unique file identification protocol tree structure and command file-oriented access procedures

  16. EVALUATED NUCLEAR STRUCTURE DATA FILE. A MANUAL FOR PREPARATION OF DATA SETS

    International Nuclear Information System (INIS)

    TULI, J.K.

    2001-01-01

    This manual describes the organization and structure of the Evaluated Nuclear Structure Data File (ENSDF). This computer-based file is maintained by the National Nuclear Data Center (NNDC) at Brookhaven National Laboratory for the international Nuclear Structure and Decay Data Network. For every mass number (presently, A ≤ 293), the Evaluated Nuclear Structure Data File (ENSDF) contains evaluated structure information. For masses A ≥ 44, this information is published in the Nuclear Data Sheets; for A < 44, ENSDF is based on compilations published in the journal Nuclear Physics. The information in ENSDF is updated by mass chain or by nuclide with a varying cycle time dependent on the availability of new information

  17. FROM CAD MODEL TO 3D PRINT VIA “STL” FILE FORMAT

    Directory of Open Access Journals (Sweden)

    Cătălin IANCU

    2010-06-01

    Full Text Available The paper work presents the STL file format, which is now used for transferring information from CAD software to a 3D printer, for obtaining the solid model in Rapid prototyping and Computer Aided Manufacturing. It’s presented also the STL format structure, its history, limitations and further development, as well as its new version to arrive and other similar file formats. As a conclusion, STL files used to transfer data from CAD package to 3D printers has a series of limitations and therefore new formats will replace it soon.

  18. The Fifth Workshop on HPC Best Practices: File Systems and Archives

    Energy Technology Data Exchange (ETDEWEB)

    Hick, Jason; Hules, John; Uselton, Andrew

    2011-11-30

    The workshop on High Performance Computing (HPC) Best Practices on File Systems and Archives was the fifth in a series sponsored jointly by the Department Of Energy (DOE) Office of Science and DOE National Nuclear Security Administration. The workshop gathered technical and management experts for operations of HPC file systems and archives from around the world. Attendees identified and discussed best practices in use at their facilities, and documented findings for the DOE and HPC community in this report.

  19. Simulating Policy Processes through Electronic Mail.

    Science.gov (United States)

    Flynn, John P.

    1987-01-01

    Focuses on the use of electronic mail for teaching and learning about social welfare policy processes and compares electronic mail as a simulation medium to more structured computer applications. (Author)

  20. Physician Compare National Downloadable File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Physician Compare National Downloadable File is organized at the individual eligible professional level; each line is unique at the professional/enrollment...

  1. XML Files: MedlinePlus

    Science.gov (United States)

    ... this page: https://medlineplus.gov/xml.html MedlinePlus XML Files To use the sharing features on this page, please enable JavaScript. MedlinePlus produces XML data sets that you are welcome to download ...

  2. Denominator File - Limited Data Set

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Denominator File combines Medicare beneficiary entitlement status information from administrative enrollment records with third-party payer information and GHP...

  3. Cytoscape file of chemical networks

    Data.gov (United States)

    U.S. Environmental Protection Agency — The maximum connectivity scores of pairwise chemical conditions summarized from Cmap results in a file with Cytoscape format (http://www.cytoscape.org/). The figures...

  4. Value Modifier Public Use File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Center for Medicare (CM) has created a standard analytical file intended to promote transparency. For each Value Modifier performance year, CM will publish a...

  5. Specifying a Realistic File System

    Directory of Open Access Journals (Sweden)

    Sidney Amani

    2015-11-01

    Full Text Available We present the most interesting elements of the correctness specification of BilbyFs, a performant Linux flash file system. The BilbyFs specification supports asynchronous writes, a feature that has been overlooked by several file system verification projects, and has been used to verify the correctness of BilbyFs's fsync( C implementation. It makes use of nondeterminism to be concise and is shallowly-embedded in higher-order logic.

  6. Antibiotic policy

    OpenAIRE

    Gyssens, Inge

    2011-01-01

    There is a clear association between antibiotic use and resistance both on individual and population levels. In the European Union, countries with large antibiotic consumption have higher resistance rates. Antibiotic resistance leads to failed treatments, prolonged hospitalisations, increased costs and deaths. With few new antibiotics in the Research & Development pipeline, prudent antibiotic use is the only option to delay the development of resistance. Antibiotic policy consists of prescrib...

  7. Internet Policy

    Science.gov (United States)

    Lehr, William H.; Pupillo, Lorenzo Maria

    The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.

  8. Detecting Data Concealment Programs Using Passive File System Analysis

    Science.gov (United States)

    Davis, Mark; Kennedy, Richard; Pyles, Kristina; Strickler, Amanda; Shenoi, Sujeet

    Individuals who wish to avoid leaving evidence on computers and networks often use programs that conceal data from conventional digital forensic tools. This paper discusses the application of passive file system analysis techniques to detect trace evidence left by data concealment programs. In addition, it describes the design and operation of Seraph, a tool that determines whether certain encryption, steganography and erasing programs were used to hide or destroy data.

  9. The rice growth image files - The Rice Growth Monitoring for The Phenotypic Functional Analysis | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available switchLanguage; BLAST Search Image Search Home About Archive Update History Data List Contact us The... Rice Growth Monitoring for The Phenotypic Functional Analysis The rice growth image file...s Data detail Data name The rice growth image files DOI 10.18908/lsdba.nbdc00945-004 Description of data contents The...ite Policy | Contact Us The rice growth image files - The Rice Growth Monitoring for The Phenotypic Functional Analysis | LSDB Archive ... ...ies 14 entries - About This Database Database Description Download License Update History of This Database S

  10. Benchmarking and monitoring framework for interconnected file synchronization and sharing services

    DEFF Research Database (Denmark)

    Mrówczyński, Piotr; Mościcki, Jakub T.; Lamanna, Massimo

    2018-01-01

    On-premise file synchronization and sharing services are increasingly used in research collaborations and academia. The main motivation for the on-premise deployment is connected with the requirements on the physical location of the data, data protection policies and integration with existing com...

  11. 75 FR 51032 - National Fuel Gas Distribution Corporation; Notice of Baseline Filing

    Science.gov (United States)

    2010-08-18

    ... Energy Regulatory Commission National Fuel Gas Distribution Corporation; Notice of Baseline Filing August 12, 2010. Take notice that on August 10, 2010, National fuel Gas Distribution Corporation submitted a... Natural Gas Policy Act of 1978 (``NGPA''). Any person desiring to participate in this rate proceeding must...

  12. 75 FR 37790 - Public Service Company of Colorado; Notice of Filing

    Science.gov (United States)

    2010-06-30

    ... Energy Regulatory Commission Public Service Company of Colorado; Notice of Filing June 23, 2010. Take notice that on June 10, 2010, Public Service Company of Colorado submitted a revised Statement of Operating Conditions for services provided under Section 311 of the Natural Gas Policy Act of 1978 (``NGPA...

  13. Learning analytics in serious gaming: uncovering the hidden treasury of game log files

    NARCIS (Netherlands)

    Westera, Wim; Nadolski, Rob; Hummel, Hans

    2018-01-01

    This paper presents an exploratory analysis of existing log files of the VIBOA environmental policy games at Utrecht University. For reasons of statistical power we’ve combined student cohorts 2008, 2009, 2010, and 2011, which led to a sample size of 118 students. The VIBOA games are inquiry-based

  14. Knowledge-based computer security advisor

    International Nuclear Information System (INIS)

    Hunteman, W.J.; Squire, M.B.

    1991-01-01

    The rapid expansion of computer security information and technology has included little support to help the security officer identify the safeguards needed to comply with a policy and to secure a computing system. This paper reports that Los Alamos is developing a knowledge-based computer security system to provide expert knowledge to the security officer. This system includes a model for expressing the complex requirements in computer security policy statements. The model is part of an expert system that allows a security officer to describe a computer system and then determine compliance with the policy. The model contains a generic representation that contains network relationships among the policy concepts to support inferencing based on information represented in the generic policy description

  15. Download this PDF file

    African Journals Online (AJOL)

    Packard Gas Chromatographic Machine. GC 5890 + TRIO-1 Mass Spectrometer by. VG Lab Ltd., and CE660 Multimude. Computing UV Spectrophotometer 6000 ... dricd under high vacuum to give a solid cxtract (yield 97.16 g. 6.2%). The extract. (85.0 g) was packed into a thimble of a 500 cm capacity Soxhlet extractor and.

  16. Download this PDF file

    African Journals Online (AJOL)

    There are many practical decision problems that fall in the category of network flow problems and numerous examples of applications can be found in areas such as telecommunication, logistics, engineering and computer science. In this paper, the feasibility of representing a network flow model as a tree network model and ...

  17. Download this PDF file

    African Journals Online (AJOL)

    positron emission tomography (PET) scanning, in combination with computed tomography (CT), has promoted this modality ... Methods: The objective of this study was to report our experience using PET/CT scanning for the localisation of a septic focus in critically ... and an oral dose of water-soluble E-Z-CAT® contrast.

  18. Download this PDF file

    African Journals Online (AJOL)

    DR. AMINU

    Department of Pure and Industrial Chemistry, Bayero University, Kano e-mail; jnaaliya@yahoo.com ... cobalt (II), nickel (II), Cu (II) and Zn (II) complexes respectively using ORIGIN 50 computational method. The Gibbs free energies of the .... of the ligands (Prolinate ions) that enters the coordination zone increases the aqua.

  19. Download this PDF file

    African Journals Online (AJOL)

    2005-06-20

    Jun 20, 2005 ... that the fruits have high sugar content and low acidity. The air dried seeds of Annona squamosa L. ... Coefficient of similarity was computed using the formula of Sokal and Sneath. (1963). .... Pino, J.A., Rosado, A., Roncal, E., Marbot, R., Aguaro J. and. Gonzalez, G., 1998. Study of the aromatic and flavour.

  20. Download this PDF file

    African Journals Online (AJOL)

    NTRODUCTION. The emergence of superspeed computers and the availability of programs have made it possible to ... relate integrals that occur in quantum chemistry directly to the properties of atocas and anolecules. ... But assigning experimental values to quantum mechanical integrals, such as Hand Hinequations.

  1. Download this PDF file

    African Journals Online (AJOL)

    IndexCopernicus Portal System

    2009-05-03

    May 3, 2009 ... (RCC). Mammogram report showed a dense spiculated mass at right upper outer quadrant and a retroareolar mass associated with clustered micro calcifications. Fine Needle Cytology and trucut biopsy were inconclusive. Computer Topography (CT) abdomen did not show evidence of RCC recurrence.

  2. Download this PDF file

    African Journals Online (AJOL)

    Mr Olusoji

    for their co-operation and assistance. I must thank Mrs Odengle, Mrs Aigbe and Mr Ojo of computer science dept, ABU Zaria, whose contribution helped me in using the SPSS software for analysis. ... may help to audit the quality of care in a more. 4 meaningful manner . The ICU of 730-bed Ahmadu Bello University. Teaching ...

  3. Download this PDF file

    African Journals Online (AJOL)

    FEN

    personal circumstances and the labour market environment within which they seek for ... Most graduates do not possess the requisite occupational skills or .... the computer system. 120. 1.52. 0.99. Rejected. 4. Ability to format/ Reformat documents. 120. 3.38. 0.72. Accepted. 5. Ability to create tables or columns. 120. 3.38.

  4. Download this PDF file

    African Journals Online (AJOL)

    User

    Federal College of Education (Technical) Lagos. Olawale Oyewole. University of Ibadan, Nigeria. Julius Kayode Apotiade. University of Ibadan, Nigeria. Abstract. The use of Online Public Access Catalogue (OPAC) by students has a lot of advantages and computer self-efficacy is a factor that could determine its effective ...

  5. Download this PDF file

    African Journals Online (AJOL)

    Information Technology

    continuation of traditional practices in the design of new general-purpose dic- tionaries which were published within this period, the increasingly central role of the computer in dictionary work, and the negative effects computerization is having on lexicography as "industry". Why the change in title? The author hints at an ...

  6. Download this PDF file

    African Journals Online (AJOL)

    Image

    the common computer terms (see appendix). Upon it's completion the glossary had a total of. 700 terminologies. The second phase of Kilinux Jambo Open Office 1.1.3 is also complete and available for use by Kiswahili speakers in East Africa and beyond. According to Kilinux (2004) Linux operating systems were translated ...

  7. Download this PDF file

    African Journals Online (AJOL)

    Neurosurgery Unit, Department of Surgery, Anmadu Bello University Teaching Hospital,. Zaria, Nigeria. Reprint requests to: Dr. ... A computed tomography scan of the brain showed left frontal extradural haematoma. The patient recovered following craniotomy and evacuation of the haematoma. KEW WORDS: Extradural ...

  8. Download this PDF file

    African Journals Online (AJOL)

    Irohibe and Agwu

    satisfaction-index was computed by adding the grand mean satisfaction score by the number of points on the satisfaction scale. To determine the constraints to FYP, possible constraining variables were listed for the respondents to tick from on a 4-point Likert type scale (to no extent = 0; to a little extent = 1; to a great extent ...

  9. Download this PDF file

    African Journals Online (AJOL)

    Education

    be dominated by males (MINEDUC, 2015). 3. Methodology. This study adopted the concurrent mixed method research design by which qualitative and quantitative data approaches were used in parallel. The quantitative approach involved the computation of statistics about enrollment and completion rates by gender within.

  10. Download this PDF file

    African Journals Online (AJOL)

    Mr Olusoji

    The commonest coercive sexual behaviour experienced was unwanted touching (53.4%). The perpetrators were mostly casual .... computer with SPSS (Statistical Package for. Social Scientists) version 16 software. Chi- .... economic conditions has on human behavior. The good knowledge demonstrated about sexual ...

  11. Download this PDF file

    African Journals Online (AJOL)

    all parts of the world use ICT to promote development, poverty reduction, empower- ment and participation .... lines and cellular phones, 3 use personal computers, and 41 are internet users. A more current report for ..... ern telecommunication services to poor people in Bangladesh with the objective of providing access to ...

  12. Download this PDF file

    African Journals Online (AJOL)

    Osondu

    comparison matrix using importance scale. It states in clear terms that the choice of an option is better than another based on the expected utility values. This method although, useful further extend the boundaries of complexity due computation time. Closely related to this approach is the multi-attribute utility approach.

  13. Download this PDF file

    African Journals Online (AJOL)

    EXPERIMENTAL. Molecular docking protocol and binding analysis. All computational studies were carried out using. AUTODOCK 4.0.1. The geometry of HDAC-8 was extracted from the Brookhaven protein data bank (PDB entry code: 1T69) complexes with the irreversible inhibitor SAHA (Suberoyl Anilde. Hydroxamic acid) ...

  14. Download this PDF file

    African Journals Online (AJOL)

    acer

    flexibility of numerical computation. In view of this, most of the Nigerians universities now offer courses in numerical methods in their engineering and scientific curriculum. The increasing importance of numerical methods in applied sciences have led to the developing a new numerical method for the solution of.

  15. Download this PDF file

    African Journals Online (AJOL)

    DR. AMINU

    molecular system constitute a reliable problem of interest in theoretical condensed matter physics. The method is based on solving the corresponding time- independent Schrödinger equation (TISE) and the time-dependant ... a probability of multiplication of particles. With the subsequent advances in computer technology, ...

  16. Download this PDF file

    African Journals Online (AJOL)

    complex mixture of unknown compounds can be the most time- ... studied the patterns that result from the presence of elements with unusual ... Compounds. By using these patterns in computerized selective data reāuction, we can improve the efficiency of data interpretation. EXPERIMENTAL. GC-MS analysis and computer ...

  17. Download this PDF file

    African Journals Online (AJOL)

    phones, TV screens, latest brands of cars, refrigerators and computers readily available at a price right here. Yet when it comes to preventing mothers from ... they will be in touch with reality and through this information they will be able to fight from their political platform for improvement. They are our partnersl We need them ...

  18. Download this PDF file

    African Journals Online (AJOL)

    abuses and thereby become vulnerable to various childhood emotional and behavioural disorders. Objective: To assess community awareness about child labour, its perceived causes, associated problems and means of tackling both. .... computer software, Statistical Package for. Social Sciences (SPSS) version 7.5.1 (15).

  19. Download this PDF file

    African Journals Online (AJOL)

    disorders among secondary school students. There is a need for school eye screening cum intervention among .... All data were entered into a computer spread sheet using descriptive analysis on the commercially available software ... Assessment of referral criteria for error of refractions. Nig JOpthl 1977(5)1:34-40. Maul E ...

  20. Download this PDF file

    African Journals Online (AJOL)

    pc

    the Faculty of Computer Science and Information Technology, Bayero University, Kano-Nigeria. The ... technologies for the implementation of web applications .... View Latest Update. View General Timetable. Customize Timetable. Customize Invigilation Schedules. View Lecture Guidelines/Etiquettes. View Examination ...

  1. Download this PDF file

    African Journals Online (AJOL)

    RAGHAVENDRA

    compression coat weight to 200 mg. Estimation of Tablet Physical Parameters. The prepared tablets were assessed for weight variation, hardness, friability and for drug content. To compute the weight variation, 20 tablets of each formulation were weighed using an electronic weighing balance (Shimadzu, Japan) and ...

  2. Download this PDF file

    African Journals Online (AJOL)

    BIG TIMMY

    2012-12-13

    Dec 13, 2012 ... below in Appendix A. (iii) The computed apparent resistivity values is then plotted against the electrode spacing (AB/2) values on a log-log graph paper to obtain a theoretical Vertical. Electrical Sounding (VES) curve for the user defined geologic model as shown in. Figure 1d. This is handled in the MATLAB.

  3. Download this PDF file

    African Journals Online (AJOL)

    Tumours of the oropharynx and nasopharynx are also common.“ “'. .... Computed tomographic scan confirmed extension of tumour mass .... lymphoma. EurJ Caneer.l974; 10: 115. — 163. 3. Facer CA, Playfair JH. Malaria,. Epstein-Barr virus and the genesis of lymphomas.Adv Cancer Res. 1989; 53: 33 — 72. 4. Magrath IT.

  4. Download this PDF file

    African Journals Online (AJOL)

    abp

    2013-09-10

    Sep 10, 2013 ... morbidities from liver diseases among these patients have also been observed due to co-infection with hepatitis B and C viruses (HBV and HCV). .... history and risks associated with transmission of HIV, HBV and HCV infection. ... password protected computer and analyzed using SPSS version 16.

  5. Download this PDF file

    African Journals Online (AJOL)

    salah

    patients infected with hepatitis C virus (HCV) using RT-PCR technique on surgical liver sample. Gene expression changes in ... tified through a detailed family history obtained through a genetic evaluation and those high risk families .... sion 9 SPSS / PC computer programs. (SPSS Inc. Chicago). All reported P- values were ...

  6. Download this PDF file

    African Journals Online (AJOL)

    Library _info_Sc_ 1

    engineering management, computer graphics and animation and inorganic chemistry, all at HND level. A total number of 46 questionnaires were returned and found analyzable out of the 48 administered. Descriptive statistics consisting of frequencies, counts, percentages and simple correlation were used to analyse data.

  7. Download this PDF file

    African Journals Online (AJOL)

    AJTCAM

    2006-01-01

    Jan 1, 2006 ... salary data from staff members and computed labor costs by evaluating the time spent by each staff cadre in the process of performing an MCS (taking sample, transporting sample, laboratory processes etc) and multiplied this by the pro- rata earnings for each staff category. The direct cash paid by the ...

  8. 77 FR 1548 - Advisory Committee on International Economic Policy; Notice of Open Meeting

    Science.gov (United States)

    2012-01-10

    ... Policy Analysis and Public Diplomacy, Bureau of Economic and Business Affairs, at (202) 647-2231 or Enoch... Analysis and Public Diplomacy, U.S. Department of State. [FR Doc. 2012-232 Filed 1-9-12; 8:45 am] BILLING... DEPARTMENT OF STATE [Public Notice: 7721] Advisory Committee on International Economic Policy...

  9. CONTUR: A program for X-ray photoemission spectroscopic personal computer-based data analysis

    Science.gov (United States)

    Contini, G.; Turchini, S.

    1996-03-01

    CONTUR, a computer program for photoemission data analysis written in QuickBasic that operates using an IBM personal computer (PC) or compatible, is described. It includes the following functions: plotting of up to four files, files saving, spectra comparison (including addition, subtraction and division) smoothing and median filtering, data marking, differentiating, resizing of X and Y scales, transforming binding into kinetic energy and vice versa, X axis cutting, showing X and Y values of the files, spikes removing, linear and Shirley background subtraction, calculating the area of the peaks, determination of maxima of the file, DOS shell. A brief description of the program and its capabilities is given.

  10. Classification and elimination of overlapped entities in DXF files

    Directory of Open Access Journals (Sweden)

    M.R.A. Atia

    2014-09-01

    Full Text Available Computer aided engineering; design, drafting and manufacturing, software packages are widely used in modern industry. The product development cycle, from idea to manufacturing, goes through different stages using different computer aided programs. These programs exchange a lot of information in different formats. One of these formats is 2D drawing in DXF standard format. The exchanged files suffer from overlapped entities and different interpretation for entity formats. This paper emphasizes on the sources of this problem and its negative effects. Moreover, it introduces software for eliminating the overlapping entities and re-classification of them. In addition, the paper explains the algorithms, which are encapsulated in the software.

  11. Multilateral negotiations over climate change policy

    Energy Technology Data Exchange (ETDEWEB)

    Costa Pinto, L.M.; Harrison, G.W. [Universidade do Minho, Braga (Portugal). Nucleo de Investigacao em Microeconomia Aplicada, Departmento de Economia

    2000-07-01

    Negotiations in the real world have many features that tend to be ignored in policy modelling. They are often multilateral, involving many negotiating parties with preferences over outcomes that can differ substantially. They are also often multi-dimensional, in the sense that several policies are negotiated over simultaneously. Trade negotiations are a prime example, as are negotiations over environmental policies to abate CO{sub 2}. The authors demonstrate how one can formally model this type of negotiation process. They use a policy-oriented computable general equilibrium model to generate preference functions which are then used in a formal multilateral bargaining game. The case study is on climate change policy, but the main contribution is to demonstrate how one can integrate formal economic models of the impacts of policies with formal bargaining models of the negotiations over those policies. 8 refs., 2 figs., 6 tabs.

  12. De-identifying a public use microdata file from the Canadian national discharge abstract database

    Directory of Open Access Journals (Sweden)

    Paton David

    2011-08-01

    Full Text Available Abstract Background The Canadian Institute for Health Information (CIHI collects hospital discharge abstract data (DAD from Canadian provinces and territories. There are many demands for the disclosure of this data for research and analysis to inform policy making. To expedite the disclosure of data for some of these purposes, the construction of a DAD public use microdata file (PUMF was considered. Such purposes include: confirming some published results, providing broader feedback to CIHI to improve data quality, training students and fellows, providing an easily accessible data set for researchers to prepare for analyses on the full DAD data set, and serve as a large health data set for computer scientists and statisticians to evaluate analysis and data mining techniques. The objective of this study was to measure the probability of re-identification for records in a PUMF, and to de-identify a national DAD PUMF consisting of 10% of records. Methods Plausible attacks on a PUMF were evaluated. Based on these attacks, the 2008-2009 national DAD was de-identified. A new algorithm was developed to minimize the amount of suppression while maximizing the precision of the data. The acceptable threshold for the probability of correct re-identification of a record was set at between 0.04 and 0.05. Information loss was measured in terms of the extent of suppression and entropy. Results Two different PUMF files were produced, one with geographic information, and one with no geographic information but more clinical information. At a threshold of 0.05, the maximum proportion of records with the diagnosis code suppressed was 20%, but these suppressions represented only 8-9% of all values in the DAD. Our suppression algorithm has less information loss than a more traditional approach to suppression. Smaller regions, patients with longer stays, and age groups that are infrequently admitted to hospitals tend to be the ones with the highest rates of suppression

  13. Search the SEC website for the latest EDGAR filings

    Data.gov (United States)

    Securities and Exchange Commission — This listing contains the most recent filings for the current official filing date (including filings made after the 5:30pm deadline on the previous filing day)....

  14. Population Files for use with CAP88 at Los Alamos

    Energy Technology Data Exchange (ETDEWEB)

    McNaughton, Michael W [Los Alamos National Laboratory; Brock, Burgandy R [Los Alamos National Laboratory

    2012-07-10

    CAP88 (Clean Air Act Assessment Package 1988) is a computer model developed for the US Environmental Protection Agency to assess the potential dose from radionuclide emissions to air and to demonstrate compliance with the Clean Air Act. It has options to calculate either individual doses, in units of mrem, or a collective dose, also called population dose, in units of person-rem. To calculate the collective dose, CAP88 uses a population file such as LANL.pop, that lists the number of people in each sector (N, NNE, NE, etc.) as a function of distance (1 to 2 km, etc.) out to a maximum radius of 80 km. Early population files are described in the Los Alamos National Laboratory (LANL) Environmental Reports for 1985 (page 14) and subsequent years. LA-13469-MS describes a population file based on the 1990 census. These files have been updated several times, most recently in 2006 for CAP88 version 3. The 2006 version used the US census for 2000. The present paper describes the 2012 updates, using the 2010 census.

  15. Overview and Status of the Ceph File System

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    The Ceph file system (CephFS) is the POSIX-compatible distributed file system running on top of Ceph's powerful and stable object store. This presentation will give a general introduction of CephFS and detail the recent work the Ceph team has done to improve its stability and usability. In particular, we will cover directory fragmentation, multiple active metadata servers, and directory subtree pinning to metadata servers, features slated for stability in the imminent Luminous release. This talk will also give an overview of how we are measuring performance of multiple active metadata servers using large on-demand cloud deployments. The results will highlight how CephFS distributes metadata load across metadata servers to achieve scaling. About the speaker Patrick Donnelly is a software engineer at Red Hat, Inc. currently working on the Ceph distributed file system. In 2016 he completed his Ph.D. in computer science at the University of Notre Dame with a dissertation on the topic of file transfer management...

  16. On Health Policy and Management (HPAM: Mind the Theory-Policy-Practice Gap

    Directory of Open Access Journals (Sweden)

    David Chinitz

    2014-12-01

    Full Text Available We argue that the field of Health Policy and Management (HPAM ought to confront the gap between theory, policy, and practice. Although there are perennial efforts to reform healthcare systems, the conceptual barriers are considerable and reflect the theory-policy-practice gap. We highlight four dimensions of the gap: 1 the dominance of microeconomic thinking in health policy analysis and design; 2 the lack of learning from management theory and comparative case studies; 3 the separation of HPAM from the rank and file of healthcare; and 4 the failure to expose medical students to issues of HPAM. We conclude with suggestions for rethinking the field of HPAM by embracing broader perspectives, e.g. ethics, urban health, systems analysis and cross-national analyses of healthcare systems.

  17. Column: File Cabinet Forensics

    Directory of Open Access Journals (Sweden)

    Simson Garfinkel

    2011-12-01

    Full Text Available Researchers can spend their time reverse engineering, performing reverse analysis, or making substantive contributions to digital forensics science. Although work in all of these areas is important, it is the scientific breakthroughs that are the most critical for addressing the challenges that we face.Reverse Engineering is the traditional bread-and-butter of digital forensics research. Companies like Microsoft and Apple deliver computational artifacts (operating systems, applications and phones to the commercial market. These artifacts are bought and used by billions. Some have evil intent, and (if society is lucky, the computers end up in the hands of law enforcement. Unfortunately the original vendors rarely provide digital forensics tools that make their systems amenable to analysis by law enforcement. Hence the need for reverse engineering.(see PDF for full column

  18. Grid Computing

    Indian Academy of Sciences (India)

    IAS Admin

    A computing grid interconnects resources such as high per- formance computers, scientific databases, and computer- controlled scientific instruments of cooperating organiza- tions each of which is autonomous. It precedes and is quite different from cloud computing, which provides computing resources by vendors to ...

  19. Fermi FT2 Spacecraft Pointing Files

    Data.gov (United States)

    National Aeronautics and Space Administration — This utility permits you to download the most current version of the spacecraft (FT2) file predicting the LAT's pointing for a given mission week. The FT2 file is a...

  20. 75 FR 31438 - Notice of Agreements Filed

    Science.gov (United States)

    2010-06-03

    ... Lines Joint Service Agreement. Filing Party: Tara L. Leiter, Esq.; Blank Rome, LLP; Watergate; 600 New... Service Agreement. Filing Party: Tara L. Leiter, Esq.; Blank Rome, LLP; Watergate; 600 New Hampshire...

  1. 75 FR 65468 - Combined Notice of Filings

    Science.gov (United States)

    2010-10-25

    ..., October 27, 2010. Docket Numbers: RP11-69-000. Applicants: Golden Triangle Storage, Inc. Description: Golden Triangle Storage, Inc. submits tariff filing per 154.203: Order 587-U Compliance Filing to be...

  2. source files for manuscript in tex format

    Data.gov (United States)

    U.S. Environmental Protection Agency — Source tex files used to create the manuscript including original figure files and raw data used in tables and inline text. This dataset is associated with the...

  3. Physician-Supplier Procedure Summary Master File

    Data.gov (United States)

    U.S. Department of Health & Human Services — This file is a 100 percent summary of all Part B Carrier and DMERC Claims processed through the Common Working File and stored in the National Claims History...

  4. Data_files_Reyes_EHP_phthalates

    Data.gov (United States)

    U.S. Environmental Protection Agency — The file contains three files in comma separated values (.csv) format. “Reyes_EHP_Phthalates_US_metabolites.csv” contains information about the National Health and...

  5. Synchronizing Defense Transportation System Reference Files

    National Research Council Canada - National Science Library

    Frohman, Harold

    1998-01-01

    .... Many DTS AISs frequently use outdated reference files. As a result, electronic transactions and documents containing reference file information have data errors that cause those AISs to reject the transactions or report erroneous information...

  6. 77 FR 56197 - Combined Notice of Filings

    Science.gov (United States)

    2012-09-12

    ... Transmission, Inc. Description: 2012 Semi-annual Fuel & Electric Power Reimbursement to be effective 10/1/2012... Pipeline Company, LLC. Description: Hurricane Surcharge Filing on 8-31-12 to be effective 10/1/2012. Filed...

  7. 12 CFR 303.221 - Filing procedures.

    Science.gov (United States)

    2010-01-01

    ... PROCEDURES Section 19 of the FDI Act (Consent to Service of Persons Convicted of Certain Criminal Offenses) § 303.221 Filing procedures. (a) Where to file. An application under section 19 of the FDI Act shall be...

  8. Efficient Web Services Policy Combination

    Science.gov (United States)

    Vatan, Farrokh; Harman, Joseph G.

    2010-01-01

    precedence. Meta-policies are specified in defeasible logic, a computationally efficient non-monotonic logic developed to model human reasoning. One drawback of this method is that at one point the algorithm starts an exhaustive search of all subsets of the set of conclusions of a defeasible theory. Although the propositional defeasible logic has linear complexity, the set of conclusions here may be large, especially in real-life practical cases. This phenomenon leads to an inefficient exponential explosion of complexity. The current process of getting a Web security policy from combination of two meta-policies consists of two steps. The first is generating a new meta-policy that is a composition of the input meta-policies, and the second is mapping the meta-policy onto a security policy. The new algorithm avoids the exhaustive search in the current algorithm, and provides a security policy that matches all requirements of the involved metapolicies.

  9. 77 FR 35371 - Combined Notice of Filings #1

    Science.gov (United States)

    2012-06-13

    .... Applicants: Duke Energy Miami Fort, LLC. Description: MBR Filing to be effective 10/1/2012. Filed Date: 6/5...-000. Applicants: Duke Energy Piketon, LLC. Description: MBR Filing to be effective 10/1/2012. Filed...-1959-000. Applicants: Duke Energy Stuart, LLC. Description: MBR Filing to be effective 10/1/2012. Filed...

  10. 77 FR 66457 - Combined Notice of Filings #2

    Science.gov (United States)

    2012-11-05

    ... MBR Compliance Filing to be effective 9/10/2012. Filed Date: 10/25/12. Accession Number: 20121025-5048.... Description: Amendment to MBR Tariff Filing to be effective 10/26/ 2012. Filed Date: 10/25/12. Accession... Resources, Ltd. Description: Amendment MBR Tariff Filing to be effective 10/26/ 2012. Filed Date: 10/25/12...

  11. 76 FR 63291 - Combined Notice Of Filings #1

    Science.gov (United States)

    2011-10-12

    ... filing per 35: MBR Tariff to be effective 9/23/2011. Filed Date: 09/23/2011. Accession Number: 20110923.... submits tariff filing per 35: MBR Tariff to be effective 9/23/2011. Filed Date: 09/23/2011. Accession.... submits tariff filing per 35: MBR Tariff to be effective 9/23/2011. Filed Date: 09/23/2011. Accession...

  12. 19 CFR 149.5 - Eligibility to file an Importer Security Filing, authorized agents.

    Science.gov (United States)

    2010-04-01

    ... Security Filing information electronically, a party must establish the communication protocol required by... 19 Customs Duties 2 2010-04-01 2010-04-01 false Eligibility to file an Importer Security Filing... HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) IMPORTER SECURITY FILING § 149.5 Eligibility to...

  13. 29 CFR 102.98 - Petition for advisory opinion; who may file; where to file.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Petition for advisory opinion; who may file; where to file... REGULATIONS, SERIES 8 Declaratory Orders and Advisory Opinions Regarding Board Jurisdiction § 102.98 Petition for advisory opinion; who may file; where to file. Whenever an agency or court of any State or...

  14. An asynchronous writing method for restart files in the gysela code in prevision of exascale systems*

    Directory of Open Access Journals (Sweden)

    Thomine O.

    2013-12-01

    Full Text Available The present work deals with an optimization procedure developed in the full-f global GYrokinetic SEmi-LAgrangian code (GYSELA. Optimizing the writing of the restart files is necessary to reduce the computing impact of crashes. These files require a very large memory space, and particularly so for very large mesh sizes. The limited bandwidth of the data pipe between the comput- ing nodes and the storage system induces a non-scalable part in the GYSELA code, which increases with the mesh size. Indeed the transfer time of RAM to data depends linearly on the files size. The necessity of non synchronized writing-in-file procedure is therefore crucial. A new GYSELA module has been developed. This asynchronous procedure allows the frequent writ- ing of the restart files, whilst preventing a severe slowing down due to the limited writing bandwidth. This method has been improved to generate a checksum control of the restart files, and automatically rerun the code in case of a crash for any cause.

  15. KaZaA and similar Peer-to-Peer (P2P) file-sharing applications

    CERN Multimedia

    2003-01-01

    Personal use of Peer-to-Peer (P2P) file sharing applications is NOT permitted at CERN. A non-exhaustive list of such applications, popular for exchanging music, videos, software etc, is: KaZaA, Napster, Gnutella, Edonkey2000, Napigator, Limewire, Bearshare, WinMX, Aimster, Morpheus, BitTorrent, ... You are reminded that use of CERN's Computing Facilities is governed by CERN's Computing Rules (Operational Circular No 5). They require that all users of CERN's Computing Facilities respect copyright, license and confidentiality agreements for data of any form (software, music, videos, etc). Sanctions are applicable in case of non-respect of the Computing Rules. Further details on restrictions for P2P applications are at: http://cern.ch/security/file-sharing CERN's Computing Rules are at: http://cern.ch/ComputingRules Denise Heagerty, CERN Computer Security Officer, Computer.Security@cern.ch

  16. Adobe acrobat: an alternative electronic teaching file construction methodology independent of HTML restrictions.

    Science.gov (United States)

    Katzman, G L

    2001-03-01

    The goal of the project was to create a method by which an in-house digital teaching file could be constructed that was simple, inexpensive, independent of hypertext markup language (HTML) restrictions, and appears identical on multiple platforms. To accomplish this, Microsoft PowerPoint and Adobe Acrobat were used in succession to assemble digital teaching files in the Acrobat portable document file format. They were then verified to appear identically on computers running Windows, Macintosh Operating Systems (OS), and the Silicon Graphics Unix-based OS as either a free-standing file using Acrobat Reader software or from within a browser window using the Acrobat browser plug-in. This latter display method yields a file viewed through a browser window, yet remains independent of underlying HTML restrictions, which may confer an advantage over simple HTML teaching file construction. Thus, a hybrid of HTML-distributed Adobe Acrobat generated WWW documents may be a viable alternative for digital teaching file construction and distribution.

  17. Fiscal policy under alternative monetary policy regimes

    OpenAIRE

    Diaz-Roldan; Carmelo Monteagudo-Cuerva

    2013-01-01

    In the particular policy framework of a monetary union, the management of fiscal policy becomes an issue of special relevance, because the fiscal discipline imposed by the monetary agreements could limit the scope of stabilization fiscal policies, and its implications on economic growth. Therefore, is not trivial to manage fiscal policy in such particular economic framework. In this paper we will review the implications of fiscal policy in open economies. But we will pay special attention to ...

  18. 77 FR 74655 - Combined Notice of Filings

    Science.gov (United States)

    2012-12-17

    ... Numbers: RP12-1066-001. Applicants: Big Sandy Pipeline, LLC. Description: Big Sandy Pipeline, LLC submits tariff filing per 154.203: RP12-1066 Compliance Filing to be effective 12/1/2012. Filed Date: 12/10/12.../1/2012. Filed Date: 12/10/12. Accession Number: 20121210-5172. Comments Due: 5 p.m. ET 12/24/12...

  19. 77 FR 47834 - Combined Notice of Filings

    Science.gov (United States)

    2012-08-10

    ..., LLC. Description: Big Sandy Fuel Filing effective 9-1-2012 to be effective 9/1/2012. Filed Date: 7/31... Negotiated Rate to be effective 8/ 1/2012. Filed Date: 7/31/12. Accession Number: 20120731-5120. Comments Due...: Compliance with CP12-5-000 to be effective 9/1/2012. Filed Date: 7/31/12. Accession Number: 20120731-5129...

  20. Evaluated nuclear structure data file

    International Nuclear Information System (INIS)

    Tuli, J.K.

    1996-01-01

    The Evaluated Nuclear Structure Data File (ENSDF) contains the evaluated nuclear properties of all known nuclides, as derived both from nuclear reaction and radioactive decay measurements. All experimental data are evaluated to create the adopted properties for each nuclide. ENSDF, together with other numeric and bibliographic files, can be accessed on-line through the INTERNET or modem, and some of the databases are also available on the World Wide Web. The structure and the scope of ENSDF are presented along with the on-line access system of the National Nuclear Data Center at Brookhaven National Laboratory. (orig.)

  1. FileMaker Pro 9

    CERN Document Server

    Coffey, Geoff

    2007-01-01

    FileMaker Pro 9: The Missing Manual is the clear, thorough and accessible guide to the latest version of this popular desktop database program. FileMaker Pro lets you do almost anything with the information you give it. You can print corporate reports, plan your retirement, or run a small country -- if you know what you're doing. This book helps non-technical folks like you get in, get your database built, and get the results you need. Pronto.The new edition gives novices and experienced users the scoop on versions 8.5 and 9. It offers complete coverage of timesaving new features such as the Q

  2. The Crystallographic Information File (CIF

    Directory of Open Access Journals (Sweden)

    I D Brown

    2006-11-01

    Full Text Available The Crystallographic Information File (CIF, owned by the International Union of Crystallography, is a file structure based on tag-value ASCII pairs with tags defined in machine-readable dictionaries. The crystallographic community publishes and archives large quantities of numeric information generated by crystal structure determinations, and CIF's acceptance was assured by its adoption as the submission format for Acta Crystallographica and by the obvious needs of the community. CIF's strength lies in its dictionaries, which define most of the concepts of crystallography; its weakness is the difficulty of writing software that exploits its full potential.

  3. Teeth Filing in Ancient Japan

    OpenAIRE

    春成, 秀爾

    1989-01-01

    The custom of teeth filing consists in engraving two or three lines of grooves in human upper median incisors and one line of groove in the upper lateral incisor to work the teeth into forked form. This custom exsisted in Africa in 19th century, in the Central America from early Preclassic period (1400 B. C.) to Postclassic period (1500 A. D.) and in Japan in the latest Jomon period (1000-200 B. C.).Specimens of teeth filing in Jomon period have been unearthened from 8 sites in Aichi Prefectu...

  4. Computer group

    International Nuclear Information System (INIS)

    Bauer, H.; Black, I.; Heusler, A.; Hoeptner, G.; Krafft, F.; Lang, R.; Moellenkamp, R.; Mueller, W.; Mueller, W.F.; Schati, C.; Schmidt, A.; Schwind, D.; Weber, G.

    1983-01-01

    The computer groups has been reorganized to take charge for the general purpose computers DEC10 and VAX and the computer network (Dataswitch, DECnet, IBM - connections to GSI and IPP, preparation for Datex-P). (orig.)

  5. Improving Mobile Infrastructure for Pervasive Personal Computing

    Science.gov (United States)

    2007-11-01

    child’s unwit- ting download of a virus over the Internet. Public computers such as those in a cluster, an Internet cafe or a hotel could easily be...51(12), 2002. 4.2.1 [35] Joshua P. MacDonald. File System Support for Delta Compression. Master’s thesis, University of California at Berkeley, 2000

  6. Digital Stratigraphy: Contextual Analysis of File System Traces in Forensic Science.

    Science.gov (United States)

    Casey, Eoghan

    2017-12-28

    This work introduces novel methods for conducting forensic analysis of file allocation traces, collectively called digital stratigraphy. These in-depth forensic analysis methods can provide insight into the origin, composition, distribution, and time frame of strata within storage media. Using case examples and empirical studies, this paper illuminates the successes, challenges, and limitations of digital stratigraphy. This study also shows how understanding file allocation methods can provide insight into concealment activities and how real-world computer usage can complicate digital stratigraphy. Furthermore, this work explains how forensic analysts have misinterpreted traces of normal file system behavior as indications of concealment activities. This work raises awareness of the value of taking the overall context into account when analyzing file system traces. This work calls for further research in this area and for forensic tools to provide necessary information for such contextual analysis, such as highlighting mass deletion, mass copying, and potential backdating. © 2017 American Academy of Forensic Sciences.

  7. Final Report for File System Support for Burst Buffers on HPC Systems

    Energy Technology Data Exchange (ETDEWEB)

    Yu, W. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mohror, K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-11-27

    Distributed burst buffers are a promising storage architecture for handling I/O workloads for exascale computing. As they are being deployed on more supercomputers, a file system that efficiently manages these burst buffers for fast I/O operations carries great consequence. Over the past year, FSU team has undertaken several efforts to design, prototype and evaluate distributed file systems for burst buffers on HPC systems. These include MetaKV: a Key-Value Store for Metadata Management of Distributed Burst Buffers, a user-level file system with multiple backends, and a specialized file system for large datasets of deep neural networks. Our progress for these respective efforts are elaborated further in this report.

  8. Computer Music

    Science.gov (United States)

    Cook, Perry R.

    This chapter covers algorithms, technologies, computer languages, and systems for computer music. Computer music involves the application of computers and other digital/electronic technologies to music composition, performance, theory, history, and the study of perception. The field combines digital signal processing, computational algorithms, computer languages, hardware and software systems, acoustics, psychoacoustics (low-level perception of sounds from the raw acoustic signal), and music cognition (higher-level perception of musical style, form, emotion, etc.).

  9. 78 FR 15359 - Combined Notice of Filings

    Science.gov (United States)

    2013-03-11

    .... Description: Energy West Development, Inc. submit Lost and Unaccounted Gas reimbursement. Filed Date: 2/28/13... Gas Pipe Line Company. Description: Annual Fuel Tracker Filing 2013 to be effective 4/1/ 2013. Filed.... Comments Due: 5 p.m. ET 3/13/13. Docket Numbers: RP13-638-000. Applicants: Panhandle Eastern Pipe Line...

  10. 77 FR 31346 - Combined Notice of Filings

    Science.gov (United States)

    2012-05-25

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Combined Notice of Filings Take notice that the Commission has received the following Natural Gas Pipeline Rate and Refund Report filings: Filings Instituting Proceedings Docket Numbers: RP12-732-000. Applicants: Golden Triangle Storage, Inc...

  11. 76 FR 30333 - Combined Notice of Filings

    Science.gov (United States)

    2011-05-25

    ... Report filings: Docket Numbers: RP11-2051-000. Applicants: Black Marlin Pipeline Company. Description: Report of Black Marlin Pipeline Company. Filed Date: 04/28/2011. Accession Number: 20110428-5219. Comment...: Northern Natural Gas Company submits tariff filing per 154.403: 20110429 Winter Market Fuel to be effective...

  12. 76 FR 45788 - Combined Notice of Filings

    Science.gov (United States)

    2011-08-01

    ...: Big Sandy LINK Implementation to be effective 9/1/2011. Filed Date: 07/14/2011. Accession Number...: ETNG Modifications for Big Sandy LINK Implementation to be effective 9/1/2011. Filed Date: 07/14/2011... Big Sandy LINK Implementation to be effective 9/1/2011. Filed Date: 07/14/2011. Accession Number...

  13. 47 CFR 76.1701 - Political file.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Political file. 76.1701 Section 76.1701... CABLE TELEVISION SERVICE Documents to be Maintained for Inspection § 76.1701 Political file. (a) Every... (political file) of all requests for cablecast time made by or on behalf of a candidate for public office...

  14. 47 CFR 73.1943 - Political file.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Political file. 73.1943 Section 73.1943... Rules Applicable to All Broadcast Stations § 73.1943 Political file. (a) Every licensee shall keep and permit public inspection of a complete and orderly record (political file) of all requests for broadcast...

  15. 77 FR 60418 - Combined Notice of Filings

    Science.gov (United States)

    2012-10-03

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Combined Notice of Filings Take notice that the Commission has received the following Natural Gas Pipeline Rate and Refund Report filings...-1064-000. Applicants: Venice Gathering System, L.L.C. Description: NAESB 2.0 Compliance Filing to be...

  16. 76 FR 30360 - Notice of Agreements Filed

    Science.gov (United States)

    2011-05-25

    ... West Coast Industrial Express, LLC. Filing Party: Wade S. Hooker, Esq.; 211 Central Park W; New York.... Parties: Pacific Maritime Association and International Longshore and Warehouse Union. Filing Party: David... Containers, Inc., and SSA Ventures, Inc. Filing Party: David F. Smith, Esq.; Cozen O'Connor; 1627 I Street...

  17. 48 CFR 6101.2 - Filing cases; time limits for filing; notice of docketing; consolidation [Rule 2].

    Science.gov (United States)

    2010-10-01

    ... Filing cases; time limits for filing; notice of docketing; consolidation . (a) Filing cases. Filing of a... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Filing cases; time limits for filing; notice of docketing; consolidation . 6101.2 Section 6101.2 Federal Acquisition Regulations...

  18. Transmission of the environmental radiation data files on the internet

    International Nuclear Information System (INIS)

    Yamaguchi, Yoshiaki; Saito, Tadashi; Yamamoto, Takayoshi; Matsumoto, Atsushi; Kyoh, Bunkei

    1999-01-01

    Recently, any text or data file has come to be transportable through the Internet with a personal computer. It is, however, restricted by selection of monitoring point to lay the cable because the personal circuit is generally used in case of continuous type environmental monitors. This is the reason why we have developed an environmental monitoring system that can transmit radiation data files on the Internet. Both 3''φ x 3'' NaI(Tl) detector and Thermo-Hydrometer are installed in the monitoring post of this system, and the data files of those detectors are transmitted from a personal computer at the monitoring point to Radioisotope Research Center of Osaka University. Environmental monitoring data from remote places have easily been obtained due to the data transmission through the Internet. Moreover, the system brings a higher precision of the environmental monitoring data because it includes the energy information of γ-rays. If it is possible to maintain the monitors at remote places, this system could execute the continuous environmental monitoring over the wide area. (author)

  19. Codes of Ethics for Computing at Russian Institutions and Universities.

    Science.gov (United States)

    Pourciau, Lester J.; Spain, Victoria, Ed.

    1997-01-01

    To determine the degree to which Russian institutions and universities have formulated and promulgated codes of ethics or policies for acceptable computer use, the author examined Russian institution and university home pages. Lists home pages examined, 10 commandments for computer ethics from the Computer Ethics Institute, and a policy statement…

  20. Analysis On Security Of Cloud Computing

    Directory of Open Access Journals (Sweden)

    Muhammad Zunnurain Hussain

    2017-01-01

    Full Text Available In this paper Author will be discussing the security issues and challenges faced by the industry in securing the cloud computing and how these problems can be tackled. Cloud computing is modern technique of sharing resources like data sharing file sharing basically sharing of resources without launching own infrastructure and using some third party resources to avoid huge investment . It is very challenging these days to secure the communication between two users although people use different encryption techniques 1.

  1. Computer Software Management and Information Center

    Science.gov (United States)

    1983-01-01

    Computer programs for passive anti-roll tank, earth resources laboratory applications, the NIMBUS-7 coastal zone color scanner derived products, transportable applications executive, plastic and failure analysis of composites, velocity gradient method for calculating velocities in an axisymmetric annular duct, an integrated procurement management system, data I/O PRON for the Motorola exorcisor, aerodynamic shock-layer shape, kinematic modeling, hardware library for a graphics computer, and a file archival system are documented.

  2. Collection Of Software For Computer Graphics

    Science.gov (United States)

    Hibbard, Eric A.; Makatura, George

    1990-01-01

    Ames Research Graphics System (ARCGRAPH) collection of software libraries and software utilities assisting researchers in generating, manipulating, and visualizing graphical data. Defines metafile format containing device-independent graphical data. File format used with various computer-graphics-manipulation and -animation software packages at Ames, including SURF (COSMIC Program ARC-12381) and GAS (COSMIC Program ARC-12379). Consists of two-stage "pipeline" used to put out graphical primitives. ARCGRAPH libraries developed on VAX computer running VMS.

  3. Computed tomography of the chest: A teaching file

    International Nuclear Information System (INIS)

    Gale, M.E.; Kartinsky, J.B.

    1987-01-01

    As a self-teaching tool, this illustrated guide facilitates home study of the complexities of thoracic CT's. Over 400 illustrations and accompanying copy are used to provide a basis for understanding the CT appearances of disease processes and a comparison of CT lookalikes. It updates new and interesting developments in the format of case presentations

  4. The global unified parallel file system (GUPFS) project: FY 2002 activities and results

    Energy Technology Data Exchange (ETDEWEB)

    Butler, Gregory F.; Lee, Rei Chi; Welcome, Michael L.

    2003-04-07

    The Global Unified Parallel File System (GUPFS) project is a multiple-phase, five-year project at the National Energy Research Scientific Computing (NERSC) Center to provide a scalable, high performance, high bandwidth, shared file system for all the NERSC production computing and support systems. The primary purpose of the GUPFS project is to make it easier to conduct advanced scientific research using the NERSC systems. This is to be accomplished through the use of a shared file system providing a unified file namespace, operating on consolidated shared storage that is directly accessed by all the NERSC production computing and support systems. During its first year, FY 2002, the GUPFS project focused on identifying, testing, and evaluating existing and emerging shared/cluster file system, SAN fabric, and storage technologies; identifying NERSC user input/output (I/O) requirements, methods, and mechanisms; and developing appropriate benchmarking methodologies and benchmark codes for a parallel environment. This report presents the activities and progress of the GUPFS project during its first year, the results of the evaluations conducted, and plans for near-term and longer-term investigations.

  5. Measurement of endodontic file lengths: calibrated versus uncalibrated digital images.

    Science.gov (United States)

    Loushine, R J; Weller, R N; Kimbrough, W F; Potter, B J

    2001-12-01

    This in vitro study compared the accuracy of file length measurements made on calibrated and uncalibrated direct digital images. Endodontic files of known lengths and ISO sizes were used in 10 single-rooted, relatively straight teeth within cadaver specimens. The crowns of the teeth were ground flat and an orthodontic wire of known length was secured to the coronal surface. This wire was placed mesiodistally and perpendicular to the root and served as the reference point for the file measurement and as a calibration reference length. A #20 file was hand-measured to a length that reached the apical third of each tooth. It was inserted and a radiographic image was secured. The instrument was remeasured three additional times at different lengths on the same tooth and reinserted before each image acquisition. Thus 40 digital images were acquired using a GE X-ray unit and a Schick Computed Dental Radiography (CDR) #2 sensor. These images were placed in random order, and an independent, blinded investigator determined the file lengths using on-screen calibrated and uncalibrated measurement of the CDR image with a straight-line and multiple-line measuring technique. The experimental measurements were compared with each other and with the known clinical measurements. A two-way analysis of variance indicated that there was a statistically significant difference showing that the calibrated measurements were more accurate than the uncalibrated measurements (p = 0.0001), and there was no significant difference between the straight-line and multiple-line measuring techniques (p = 0.14).

  6. Nuclear Structure References (NSR) file

    International Nuclear Information System (INIS)

    Ewbank, W.B.

    1978-08-01

    The use of the Nuclear Structure References file by the Nuclear Data Project at ORNL is described. Much of the report concerns format information of interest only to those preparing input to the system or otherwise needing detailed knowledge of its internal structure. 17 figures

  7. Efficacy of three different rotary files to remove gutta-percha and Resilon from root canals.

    Science.gov (United States)

    Marfisi, K; Mercade, M; Plotino, G; Duran-Sindreu, F; Bueno, R; Roig, M

    2010-11-01

    To evaluate the efficacy of ProTaper Retreatment files, Mtwo Retreatment files and Twisted Files for removal of gutta-percha and Resilon in straight root canals. Ninety single root canals were instrumented and randomly allocated into 6 groups of 15 specimens each with regards to the filling material and instruments used. Group 1: gutta-percha/ProTaper; Group 2: Resilon/ProTaper; Group 3: gutta-percha/Mtwo; Group 4: Resilon/Mtwo; Group 5: gutta-percha/Twisted Files; Group 6: Resilon/Twisted Files. For all roots, the following data were recorded: procedural errors, duration of retreatment, canal wall cleanliness through optical microscope and cone beam computed tomography (CBCT). Data were statistically analysed, and the level of significance was set at P=0.05. No system completely removed the root filling material from root canal walls. No significant differences were observed between the rotary systems in terms of the area of filling material left within the canals (P>0.05). There were statistically significant differences between the filling materials: Resilon/Real Seal had less residual material than gutta-percha/AH plus (CBCT: P=0.01; microscope: P=0.018). Mtwo Retreatment files were more rapid when removing filling material than ProTaper Retreatment files (P=0.19) and Twisted Files (P=0.04). No system removed the root filling materials entirely. Mtwo Retreatment files required less time to remove root filling material than the other instruments. Resilon was removed significantly better from the canal walls than gutta-percha, irrespective of the rotary instruments used. © 2010 International Endodontic Journal.

  8. Lessons Learned in Deploying the World s Largest Scale Lustre File System

    Energy Technology Data Exchange (ETDEWEB)

    Dillow, David A [ORNL; Fuller, Douglas [ORNL; Wang, Feiyi [ORNL; Oral, H Sarp [ORNL; Zhang, Zhe [ORNL; Hill, Jason J [ORNL; Shipman, Galen M [ORNL

    2010-01-01

    The Spider system at the Oak Ridge National Laboratory's Leadership Computing Facility (OLCF) is the world's largest scale Lustre parallel file system. Envisioned as a shared parallel file system capable of delivering both the bandwidth and capacity requirements of the OLCF's diverse computational environment, the project had a number of ambitious goals. To support the workloads of the OLCF's diverse computational platforms, the aggregate performance and storage capacity of Spider exceed that of our previously deployed systems by a factor of 6x - 240 GB/sec, and 17x - 10 Petabytes, respectively. Furthermore, Spider supports over 26,000 clients concurrently accessing the file system, which exceeds our previously deployed systems by nearly 4x. In addition to these scalability challenges, moving to a center-wide shared file system required dramatically improved resiliency and fault-tolerance mechanisms. This paper details our efforts in designing, deploying, and operating Spider. Through a phased approach of research and development, prototyping, deployment, and transition to operations, this work has resulted in a number of insights into large-scale parallel file system architectures, from both the design and the operational perspectives. We present in this paper our solutions to issues such as network congestion, performance baselining and evaluation, file system journaling overheads, and high availability in a system with tens of thousands of components. We also discuss areas of continued challenges, such as stressed metadata performance and the need for file system quality of service alongside with our efforts to address them. Finally, operational aspects of managing a system of this scale are discussed along with real-world data and observations.

  9. Food policy an ethics

    DEFF Research Database (Denmark)

    Coff, Christian Eyde; Kemp, Peter

    2014-01-01

    makes of food policy a highly complex and diverse area. The entry opens with at description of the concept of policy and food policy and how it relates to ethical principles and values. The fourth section discusses some influental definitions of food policy. The final section contains a description......This entry gives an overview of food policy and major ethical principles that in the last decades have been proposed and advocated for in debates on food policy. Food policies touch upon a vast area of interrelated policies (like health, transport, environment, poverty, animal welfare etc.) which...... of ethical principles and ideas of relevance to food policy....

  10. Food policy an ethics

    DEFF Research Database (Denmark)

    Coff, Christian Eyde; Kemp, Peter

    2014-01-01

    This entry gives an overview of food policy and major ethical principles that in the last decades have been proposed and advocated for in debates on food policy. Food policies touch upon a vast area of interrelated policies (like health, transport, environment, poverty, animal welfare etc.) which...... makes of food policy a highly complex and diverse area. The entry opens with at description of the concept of policy and food policy and how it relates to ethical principles and values. The fourth section discusses some influental definitions of food policy. The final section contains a description...... of ethical principles and ideas of relevance to food policy....

  11. Research for health policy

    National Research Council Canada - National Science Library

    Bell, Erica

    2010-01-01

    ... Explicit, implicit, and pragmatic dimensions of policy-maker's needs and context 31 Constraints on policy-makers 32 Deciphering trade-offs 33 The policy-problem: deciphering uncertainty and the problem of innovation 34 A tool for deciphering policy problems 35 The different components of the policy problem 37 Recommended reading 38 Case studies in...

  12. Política monetaria en el modelo con expectativas, curva de Phillips: práctica de ordenador Política monetària en el model amb expectatives, corba de Philipps: pràctica d'ordinador Monetary Policy in the Expectations Model, Phillips Curve: A Computer Practice

    Directory of Open Access Journals (Sweden)

    Jana Hromcová

    2009-12-01

    Full Text Available Recomendamos un ejercicio numérico que permite a los estudiantes observar la dinámica de un simple modelo, compuesto por la curva de Phillips, ley de Okun y demanda agregada, ante variaciones en la política monetaria. El ejercicio tiene como objetivo enseñar a los estudiantes la importancia de la manera en la que se forman las expectativas y la (nocredibilidad del banco central para el cumplimiento de los objetivos de la política monetaria.Monetary Policy in the Expectations Model, Phillips Curve: A Computer Practice

  13. BALANCER: A Computer Program for Balancing Chemical Equations.

    Science.gov (United States)

    Jones, R. David; Schwab, A. Paul

    1989-01-01

    Describes the theory and operation of a computer program which was written to balance chemical equations. Software consists of a compiled file of 46K for use under MS-DOS 2.0 or later on IBM PC or compatible computers. Additional specifications of courseware and availability information are included. (Author/RT)

  14. Operating a Computer Bulletin Board System for Psychiatrists and Psychologists

    OpenAIRE

    Miller, Marvin J.

    1988-01-01

    A computer Bulletin Board System (BBS) provides messaging and file transfer functions for a professional organization. It allows ready access to clinical computer programs at minimal cost. Ways to encourage development of public domain clinical software and its distribution through BBSs are discussed.

  15. Managing Laboratory Data Using Cloud Computing as an Organizational Tool

    Science.gov (United States)

    Bennett, Jacqueline; Pence, Harry E.

    2011-01-01

    One of the most significant difficulties encountered when directing undergraduate research and developing new laboratory experiments is how to efficiently manage the data generated by a number of students. Cloud computing, where both software and computer files reside online, offers a solution to this data-management problem and allows researchers…

  16. A Metadata-Rich File System

    Energy Technology Data Exchange (ETDEWEB)

    Ames, S; Gokhale, M B; Maltzahn, C

    2009-01-07

    Despite continual improvements in the performance and reliability of large scale file systems, the management of file system metadata has changed little in the past decade. The mismatch between the size and complexity of large scale data stores and their ability to organize and query their metadata has led to a de facto standard in which raw data is stored in traditional file systems, while related, application-specific metadata is stored in relational databases. This separation of data and metadata requires considerable effort to maintain consistency and can result in complex, slow, and inflexible system operation. To address these problems, we have developed the Quasar File System (QFS), a metadata-rich file system in which files, metadata, and file relationships are all first class objects. In contrast to hierarchical file systems and relational databases, QFS defines a graph data model composed of files and their relationships. QFS includes Quasar, an XPATH-extended query language for searching the file system. Results from our QFS prototype show the effectiveness of this approach. Compared to the defacto standard, the QFS prototype shows superior ingest performance and comparable query performance on user metadata-intensive operations and superior performance on normal file metadata operations.

  17. Computational composites

    DEFF Research Database (Denmark)

    Vallgårda, Anna K. A.; Redström, Johan

    2007-01-01

    Computational composite is introduced as a new type of composite material. Arguing that this is not just a metaphorical maneuver, we provide an analysis of computational technology as material in design, which shows how computers share important characteristics with other materials used in design...... and architecture. We argue that the notion of computational composites provides a precise understanding of the computer as material, and of how computations need to be combined with other materials to come to expression as material. Besides working as an analysis of computers from a designer’s point of view......, the notion of computational composites may also provide a link for computer science and human-computer interaction to an increasingly rapid development and use of new materials in design and architecture....

  18. EQPT, a data file preprocessor for the EQ3/6 software package: User`s guide and related documentation (Version 7.0); Part 2

    Energy Technology Data Exchange (ETDEWEB)

    Daveler, S.A.; Wolery, T.J.

    1992-12-17

    EQPT is a data file preprocessor for the EQ3/6 software package. EQ3/6 currently contains five primary data files, called datao files. These files comprise alternative data sets. These data files contain both standard state and activity coefficient-related data. Three (com, sup, and nea) support the use of the Davies or B-dot equations for the activity coefficients; the other two (hmw and pit) support the use of Pitzer`s (1973, 1975) equations. The temperature range of the thermodynamic data on these data files varies from 25{degrees}C only to 0-300{degrees}C. The principal modeling codes in EQ3/6, EQ3NR and EQ6, do not read a data0 file, however. Instead, these codes read an unformatted equivalent called a data1 file. EQPT writes a datal file, using the corresponding data0 file as input. In processing a data0 file, EQPT checks the data for common errors, such as unbalanced reactions. It also conducts two kinds of data transformation. Interpolating polynomials are fit to data which are input on temperature adds. The coefficients of these polynomials are then written on the datal file in place of the original temperature grids. A second transformation pertains only to data files tied to Pitzer`s equations. The commonly reported observable Pitzer coefficient parameters are mapped into a set of primitive parameters by means of a set of conventional relations. These primitive form parameters are then written onto the datal file in place of their observable counterparts. Usage of the primitive form parameters makes it easier to evaluate Pitzer`s equations in EQ3NR and EQ6. EQPT and the other codes in the EQ3/6 package are written in FORTRAN 77 and have been developed to run under the UNIX operating system on computers ranging from workstations to supercomputers.

  19. EQPT, a data file preprocessor for the EQ3/6 software package: User's guide and related documentation (Version 7.0)

    International Nuclear Information System (INIS)

    Daveler, S.A.; Wolery, T.J.

    1992-01-01

    EQPT is a data file preprocessor for the EQ3/6 software package. EQ3/6 currently contains five primary data files, called datao files. These files comprise alternative data sets. These data files contain both standard state and activity coefficient-related data. Three (com, sup, and nea) support the use of the Davies or B equations for the activity coefficients; the other two (hmw and pit) support the use of Pitzer's (1973, 1975) equations. The temperature range of the thermodynamic data on these data files varies from 25 degrees C only to 0-300 degrees C. The principal modeling codes in EQ3/6, EQ3NR and EQ6, do not read a data0 file, however. Instead, these codes read an unformatted equivalent called a data1 file. EQPT writes a datal file, using the corresponding data0 file as input. In processing a data0 file, EQPT checks the data for common errors, such as unbalanced reactions. It also conducts two kinds of data transformation. Interpolating polynomials are fit to data which are input on temperature adds. The coefficients of these polynomials are then written on the datal file in place of the original temperature grids. A second transformation pertains only to data files tied to Pitzer's equations. The commonly reported observable Pitzer coefficient parameters are mapped into a set of primitive parameters by means of a set of conventional relations. These primitive form parameters are then written onto the datal file in place of their observable counterparts. Usage of the primitive form parameters makes it easier to evaluate Pitzer's equations in EQ3NR and EQ6. EQPT and the other codes in the EQ3/6 package are written in FORTRAN 77 and have been developed to run under the UNIX operating system on computers ranging from workstations to supercomputers

  20. Big Data for Public Health Policy-Making: Policy Empowerment.

    Science.gov (United States)

    Mählmann, Laura; Reumann, Matthias; Evangelatos, Nikolaos; Brand, Angela

    2018-04-04

    Digitization is considered to radically transform healthcare. As such, with seemingly unlimited opportunities to collect data, it will play an important role in the public health policy-making process. In this context, health data cooperatives (HDC) are a key component and core element for public health policy-making and for exploiting the potential of all the existing and rapidly emerging data sources. Being able to leverage all the data requires overcoming the computational, algorithmic, and technological challenges that characterize today's highly heterogeneous data landscape, as well as a host of diverse regulatory, normative, governance, and policy constraints. The full potential of big data can only be realized if data are being made accessible and shared. Treating research data as a public good, creating HDC to empower citizens through citizen-owned health data, and allowing data access for research and the development of new diagnostics, therapies, and public health policies will yield the transformative impact of digital health. The HDC model for data governance is an arrangement, based on moral codes, that encourages citizens to participate in the improvement of their own health. This then enables public health institutions and policymakers to monitor policy changes and evaluate their impact and risk on a population level. © 2018 S. Karger AG, Basel.