WorldWideScience

Sample records for program computer matching

  1. 77 FR 74518 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2012-12-14

    ...: Notice--computer matching between the Office of Personnel Management and the Social Security... Personnel Management (OPM) is publishing notice of its new computer matching program with the Social... matching by Federal agencies when records in a system of records are matched with other Federal, State, or...

  2. 78 FR 1275 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-01-08

    ...: Notice--computer matching between the Office of Personnel Management and the Social Security... matching program with the Social Security Administration (SSA). DATES: OPM will file a report of the..., as amended, regulates the use of computer matching by Federal agencies when records in a system of...

  3. 77 FR 38610 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2012-06-28

    ... education at the time of the parent or guardian's death. Beginning July 1, 2010, students who are otherwise... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF EDUCATION Privacy Act of 1974; Computer Matching Program AGENCY: Department of Education. ACTION: Notice--Computer...

  4. 77 FR 56824 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2012-09-14

    ... information contained in the USCIS database is referred to as the Verification Information System (VIS), which... records entitled ``Verification Information System Records Notice (DHS-2007-0010).'' Where there is a... Information: Privacy Act of 1974; Computer Matching Program between the U.S. Department of Education and the...

  5. 76 FR 11435 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2011-03-02

    ... Federal student financial assistance, and the ED personal information number (PIN) Registration System of Records (18-11-12), which contains the applicant's information to receive an ED PIN, will be matched... Dates of the Matching Program This matching program must be approved by the Data Integrity Board of each...

  6. 75 FR 63524 - Computer Matching and Privacy Protection Act of 1988; Report of Matching Program: RRB and State...

    Science.gov (United States)

    2010-10-15

    ... Computer Matching and Privacy Protection Act of 1988; Report of Matching Program: RRB and State Medicare... required by the Computer Matching and Privacy Protection Act of ] 1988, the RRB is issuing a public notice... Matching and Privacy Protection Act of 1988, Public Law 100-503, requires a Federal agency participating in...

  7. 78 FR 29786 - Computer Matching and Privacy Protection Act of 1988; Report of Matching Program: RRB and State...

    Science.gov (United States)

    2013-05-21

    ... Computer Matching and Privacy Protection Act of 1988; Report of Matching Program: RRB and State Medicare... computer matching program due to expire on May 24, 2013. SUMMARY: As required by the Privacy Act of 1974.... Grant, Chief Privacy Officer, Railroad Retirement Board, 844 North Rush Street, Chicago, Illinois 60611...

  8. 78 FR 21713 - Privacy Act of 1974: Computer Matching Program

    Science.gov (United States)

    2013-04-11

    ..., and the Office of Management and Budget (OMB) Guidelines on the Conduct of Matching Programs, notice... cost of medical care. These veterans supply household income information that includes their spouses and dependents at the time of application for VA health care benefits. DATES: Effective Date: This...

  9. 76 FR 47299 - Privacy Act of 1974: Computer Matching Program

    Science.gov (United States)

    2011-08-04

    ..., and the Office of Management and Budget (OMB) Guidelines on the Conduct of Matching Programs, notice... cost of medical care. These veterans supply household income information that includes their spouses and dependents at the time of application for VA health care benefits. DATES: Effective Date: This...

  10. 78 FR 50146 - Privacy Act of 1974: Computer Matching Program

    Science.gov (United States)

    2013-08-16

    ..., and the Office of Management and Budget (OMB) Guidelines on the Conduct of Matching Programs, notice... care. These veterans supply household income information that includes their spouses and dependents at the time of application for VA health care benefits. DATES: Effective Date: The effective (start) date...

  11. 75 FR 54966 - Privacy Act of 1974: Computer Matching Program

    Science.gov (United States)

    2010-09-09

    ..., and the Office of Management and Budget (OMB) Guidelines on the Conduct of Matching Programs, notice... cost of medical care. These veterans supply household income information that includes their spouses and dependents at the time of application for VA health care benefits. DATES: Effective Date: This...

  12. 78 FR 11815 - Creation of a New Computer Matching Program That Will Expire on August 13, 2014

    Science.gov (United States)

    2013-02-20

    ... Creation of a New Computer Matching Program That Will Expire on August 13, 2014 AGENCY: National Finance... publishing notice of a computer matching program (CMP) that NFC will conduct on behalf of itself and the... description of the matching program. Notice of Computer Matching Program NFC will match applicant records with...

  13. Computing Optimal Morse Matchings

    OpenAIRE

    Joswig, Michael; Pfetsch, Marc E.

    2004-01-01

    Morse matchings capture the essential structural information of discrete Morse functions. We show that computing optimal Morse matchings is NP-hard and give an integer programming formulation for the problem. Then we present polyhedral results for the corresponding polytope and report on computational results.

  14. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ...)/Department of Veterans Affairs (VA), Veterans Benefits Administration (VBA))--Match Number 1008 AGENCY: SSA... of an existing computer matching program that we are currently conducting with VA/VBA. DATES: We will... Benefits Administration (VBA) A. Participating Agencies SSA and VA/VBA. B. Purpose of the Matching Program...

  15. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ...)/Department of Veterans Affairs (VA), Veterans Benefits Administration (VBA))--Match Number 1309 AGENCY: SSA... of an existing computer matching program that we are currently conducting with VA/VBA. DATES: We will... Benefits Administration (VBA). A. Participating Agencies SSA and VA/VBA. B. Purpose of the Matching Program...

  16. 76 FR 5235 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA Internal Match)-Match Number 1014

    Science.gov (United States)

    2011-01-28

    ... which we will compare our current employee records of the Federal Personnel/Payroll System with the... amended, regulates the use of computer matching by Federal agencies when records in a system of records... and Privacy Protection Act of 1988. The Privacy Act provides that no record contained in a system of...

  17. 75 FR 28252 - Notice of a Computer Matching Program

    Science.gov (United States)

    2010-05-20

    ...) will match two internal systems of record--transit benefit records (GSA/Transit-1) and payroll records..., Payroll Accounting and Reporting System, 73 FR 22398 (April 25, 2008), contains the GSA payroll records... systems of records, transportation benefit records and payroll records, to identify any person receiving...

  18. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration. ACTION...

  19. 75 FR 69988 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2010-11-16

    ... section 5301 of the Anti-Drug Abuse Act of 1988, and which was amended and redesignated as section 421 of... Abuse Act of 1988, Pub. L. 100-690, 21 U.S.C. 853a, which was amended and redesignated as section 421 of... court orders issued pursuant to the Denial of Federal Benefits Program. 3. Authority for Conducting the...

  20. 75 FR 12226 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2010-03-15

    ...; the Academic Competitiveness Grant Program; the National Science and Mathematics Access to Retain... (FRS), toll free, at 1-800-877-8339. Individuals with disabilities can obtain this document in an... person listed in the preceding paragraph. Electronic Access to This Document You can view this document...

  1. 75 FR 53005 - Privacy Act of 1974, as amended; Notice of Computer Matching Program (Railroad Retirement Board...

    Science.gov (United States)

    2010-08-30

    ... Privacy Act of 1974, as amended; Notice of Computer Matching Program (Railroad Retirement Board and Social... computer-matching program with the Social Security Administration (SSA). The purpose of this notice is to... Federal agencies when records contained in a Privacy Act System of Records are matched with other Federal...

  2. 77 FR 39748 - Computer Matching and Privacy Protection Act of 1988; Report of Matching Program: RRB and State...

    Science.gov (United States)

    2012-07-05

    ...] [FR Doc No: 2012-16384] RAILROAD RETIREMENT BOARD Computer Matching and Privacy Protection Act of 1988.... General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503), amended the Privacy... amended the Privacy Act regarding protection for such persons. The Privacy Act, as amended, regulates the...

  3. 75 FR 7648 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Veterans Affairs...

    Science.gov (United States)

    2010-02-22

    .../Veterans Benefits Administration (VA/ VBA))--Match Number 1309 AGENCY: Social Security Administration (SSA... announces a renewal of an existing computer matching program that we are currently conducting with VA/VBA... Matching Program, SSA With the Department of Veterans Affairs/Veterans Benefits Administration (VA/VBA) A...

  4. 75 FR 40770 - Creation of a New Computer Matching Program That Will Expire on December 31, 2013

    Science.gov (United States)

    2010-07-14

    ...; ] DEPARTMENT OF AGRICULTURE Creation of a New Computer Matching Program That Will Expire on December 31, 2013... computer matching program that we will conduct with the U.S. Office of Personnel Management (OPM), The... comments received will be available for public inspection at this address. FOR FURTHER INFORMATION CONTACT...

  5. 76 FR 12397 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Public Debt (BPD...

    Science.gov (United States)

    2011-03-07

    ... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Bureau of the Public Debt (BPD... Computer Matching Program, SSA with the Bureau of the Public Debt (BPD) A. Participating Agencies SSA and... will be available for public inspection at this address. FOR FURTHER INFORMATION CONTACT: The Executive...

  6. 76 FR 12398 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Public Debt (BPD...

    Science.gov (United States)

    2011-03-07

    ... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Bureau of the Public Debt (BPD... Computer Matching Program, SSA With the Bureau of the Public Debt (BPD) A. Participating Agencies SSA and... will be available for public inspection at this address. FOR FURTHER INFORMATION CONTACT: The Executive...

  7. 78 FR 34678 - Privacy Act of 1974, as Amended; Notice of Computer Matching Program (Railroad Retirement Board...

    Science.gov (United States)

    2013-06-10

    ... of Social Security Number (SSN) Holders and SSN Applications (the Enumeration System); 75 FR 82121... Privacy Act of 1974, as Amended; Notice of Computer Matching Program (Railroad Retirement Board and Social...-matching program with the Social Security Administration (SSA). The purpose of this notice is to advise...

  8. 77 FR 38880 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Railroad Retirement Board (SSA...

    Science.gov (United States)

    2012-06-29

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Railroad Retirement Board (SSA/RRB))--Match Number 1308 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of...

  9. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ... From the Federal Register Online via the Government Publishing Office ] SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of...

  10. 78 FR 51264 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of the Treasury...

    Science.gov (United States)

    2013-08-20

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of the Treasury/Internal Revenue Service (IRS))--Match Number 1016 AGENCY: Social Security Administration (SSA). ACTION...

  11. 77 FR 48045 - Supplemental Nutrition Assistance Program: Disqualified Recipient Reporting and Computer Matching...

    Science.gov (United States)

    2012-08-13

    ... periodic action to ensure that an individual who is detained in a Federal, State, or local penal... time frame set forth under the computer matching requirements are considered to be out of compliance... individual who is detained in a Federal, State, or local penal, correctional, or other detention facility for...

  12. 76 FR 39119 - Privacy Act of 1974; Notice of a Computer Matching Program Between the Department of Housing and...

    Science.gov (United States)

    2011-07-05

    ... URBAN DEVELOPMENT Privacy Act of 1974; Notice of a Computer Matching Program Between the Department of Housing and Urban Development (HUD) and the United States Department of Education (ED) AGENCY: Office of... Donna Robinson-Staton, Chief Privacy Officer, Department of Housing and Urban Development, Office of the...

  13. 77 FR 35432 - Privacy Act of 1974, Computer Matching Program: United States Postal Service and the Defense...

    Science.gov (United States)

    2012-06-13

    ... computer match. The Postal Service's Personnel Compensation and Payroll Records (USPS System of Records... payroll system of records, and permits disclosures to Federal and state agencies when the record is needed.... The computer match between the USPS Payroll system and the DEERS could have an adverse impact on those...

  14. 78 FR 48170 - Privacy Act of 1974; CMS Computer Match No. 2013-12; HHS Computer Match No. 1307; SSA Computer...

    Science.gov (United States)

    2013-08-07

    ... Services Privacy Act of 1974; CMS Computer Match No. 2013-12; HHS Computer Match No. 1307; SSA Computer... Human Services (HHS). ACTION: Notice of Computer Matching Program (CMP). SUMMARY: In accordance with [email protected] . SUPPLEMENTARY INFORMATION: The Computer Matching and Privacy Protection Act of 1988...

  15. 75 FR 30839 - Privacy Act of 1974; CMS Computer Match No. 2010-03, HHS Computer Match No. 1003, SSA Computer...

    Science.gov (United States)

    2010-06-02

    ... HUMAN SERVICES Centers for Medicare & Medicaid Services Privacy Act of 1974; CMS Computer Match No. 2010-03, HHS Computer Match No. 1003, SSA Computer Match No. 1048, IRS Project No. 241 AGENCY: Department... renewal of an existing computer matching program (CMP) that has an expiration date of June 30, 2010...

  16. 78 FR 71591 - Privacy Act of 1974; Computer Matching Program between the U.S. Department of Education (ED) and...

    Science.gov (United States)

    2013-11-29

    ...) (recipient agency) and the U.S. Department of Veterans Affairs (VA) (source agency). After the ED and VA Data..., the Computer Matching and Privacy Protection Act of 1988, 54 FR 25818 (June 19, 1989), and OMB... published in the Federal Register, in text or Adobe Portable Document Format (PDF). To use PDF you must have...

  17. A computer program to obtain time-correlated gust loads for nonlinear aircraft using the matched-filter-based method

    Science.gov (United States)

    Scott, Robert C.; Pototzky, Anthony S.; Perry, Boyd, III

    1994-01-01

    NASA Langley Research Center has, for several years, conducted research in the area of time-correlated gust loads for linear and nonlinear aircraft. The results of this work led NASA to recommend that the Matched-Filter-Based One-Dimensional Search Method be used for gust load analyses of nonlinear aircraft. This manual describes this method, describes a FORTRAN code which performs this method, and presents example calculations for a sample nonlinear aircraft model. The name of the code is MFD1DS (Matched-Filter-Based One-Dimensional Search). The program source code, the example aircraft equations of motion, a sample input file, and a sample program output are all listed in the appendices.

  18. 78 FR 29748 - Privacy Act of 1974; Computer Matching Program Between the Department of Education and the...

    Science.gov (United States)

    2013-05-21

    ... ineligible for Federal benefits to the General Services Administration (GSA) for inclusion in GSA's List of... (DEBARS) database that is authorized under section 5301 for the purpose of ensuring that title IV, HEA... matching against the DOJ database is more efficient and effective than matching against the GSA List. The...

  19. 76 FR 56781 - Privacy Act of 1974; Notice of a Computer Matching Program Between the Department of Housing and...

    Science.gov (United States)

    2011-09-14

    ... Housing and Urban Development (HUD) and the Social Security Administration (SSA): Matching Tenant Data in... Quality Housing and Work Responsibility Act (QHWRA) of 1998. On March 11, 2009, Section 239 of HUD's 2009... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOUSING AND...

  20. Fast Legendre moment computation for template matching

    Science.gov (United States)

    Li, Bing C.

    2017-05-01

    Normalized cross correlation (NCC) based template matching is insensitive to intensity changes and it has many applications in image processing, object detection, video tracking and pattern recognition. However, normalized cross correlation implementation is computationally expensive since it involves both correlation computation and normalization implementation. In this paper, we propose Legendre moment approach for fast normalized cross correlation implementation and show that the computational cost of this proposed approach is independent of template mask sizes which is significantly faster than traditional mask size dependent approaches, especially for large mask templates. Legendre polynomials have been widely used in solving Laplace equation in electrodynamics in spherical coordinate systems, and solving Schrodinger equation in quantum mechanics. In this paper, we extend Legendre polynomials from physics to computer vision and pattern recognition fields, and demonstrate that Legendre polynomials can help to reduce the computational cost of NCC based template matching significantly.

  1. 78 FR 47336 - Privacy Act of 1974; Computer Matching Program Between the Department of Housing and Urban...

    Science.gov (United States)

    2013-08-05

    ... of 1996 (25 U.S.C. 4101 et seq.); and the Quality Housing and Work Responsibility Act of 1998 (42 U.S...-administered programs involving rental housing assistance to disclose to HUD their social security numbers... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOUSING AND...

  2. 76 FR 579 - Privacy Act of 1974; Computer Matching Program Between the Department of Housing and Urban...

    Science.gov (United States)

    2011-01-05

    ... Assistance and Self-Determination Act of 1996 (25 U.S.C. 4101 et seq.); and the Quality Housing and Work... older) in HUD-administered programs involving rental housing assistance to disclose to HUD their social... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOUSING AND...

  3. 75 FR 16171 - Privacy Act of 1974; Notice of Modification of Existing Computer Matching Program Between the...

    Science.gov (United States)

    2010-03-31

    ... Between the Department of Housing and Urban Development (HUD) and the Social Security Administration (SSA... Housing and Work Responsibility Act (QHWRA) of 1998. The program will also provide for verification of... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOUSING AND...

  4. Shade matching assisted by digital photography and computer software.

    Science.gov (United States)

    Schropp, Lars

    2009-04-01

    To evaluate the efficacy of digital photographs and graphic computer software for color matching compared to conventional visual matching. The shade of a tab from a shade guide (Vita 3D-Master Guide) placed in a phantom head was matched to a second guide of the same type by nine observers. This was done for twelve selected shade tabs (tests). The shade-matching procedure was performed visually in a simulated clinic environment and with digital photographs, and the time spent for both procedures was recorded. An alternative arrangement of the shade tabs was used in the digital photographs. In addition, a graphic software program was used for color analysis. Hue, chroma, and lightness values of the test tab and all tabs of the second guide were derived from the digital photographs. According to the CIE L*C*h* color system, the color differences between the test tab and tabs of the second guide were calculated. The shade guide tab that deviated least from the test tab was determined to be the match. Shade matching performance by means of graphic software was compared with the two visual methods and tested by Chi-square tests (alpha= 0.05). Eight of twelve test tabs (67%) were matched correctly by the computer software method. This was significantly better (p < 0.02) than the performance of the visual shade matching methods conducted in the simulated clinic (32% correct match) and with photographs (28% correct match). No correlation between time consumption for the visual shade matching methods and frequency of correct match was observed. Shade matching assisted by digital photographs and computer software was significantly more reliable than by conventional visual methods.

  5. Computer-Generated Holographic Matched Filters

    Science.gov (United States)

    Butler, Steven Frank

    This dissertation presents techniques for the use of computer-generated holograms (CGH) for matched filtering. An overview of the supporting technology is provided. Included are techniques for modifying existing CGH algorithms to serve as matched filters in an optical correlator. It shows that matched filters produced in this fashion can be modified to improve the signal-to-noise and efficiency over that possible with conventional holography. The effect and performance of these modifications are demonstrated. In addition, a correction of film non-linearity in continuous -tone filter production is developed. Computer simulations provide quantitative and qualitative demonstration of theoretical principles, with specific examples validated in optical hardware. Conventional and synthetic holograms, both bleached and unbleached, are compared.

  6. History Matching in Parallel Computational Environments

    Energy Technology Data Exchange (ETDEWEB)

    Steven Bryant; Sanjay Srinivasan; Alvaro Barrera; Yonghwee Kim; Sharad Yadav

    2006-08-31

    A novel methodology for delineating multiple reservoir domains for the purpose of history matching in a distributed computing environment has been proposed. A fully probabilistic approach to perturb permeability within the delineated zones is implemented. The combination of robust schemes for identifying reservoir zones and distributed computing significantly increase the accuracy and efficiency of the probabilistic approach. The information pertaining to the permeability variations in the reservoir that is contained in dynamic data is calibrated in terms of a deformation parameter rD. This information is merged with the prior geologic information in order to generate permeability models consistent with the observed dynamic data as well as the prior geology. The relationship between dynamic response data and reservoir attributes may vary in different regions of the reservoir due to spatial variations in reservoir attributes, well configuration, flow constrains etc. The probabilistic approach then has to account for multiple r{sub D} values in different regions of the reservoir. In order to delineate reservoir domains that can be characterized with different r{sub D} parameters, principal component analysis (PCA) of the Hessian matrix has been done. The Hessian matrix summarizes the sensitivity of the objective function at a given step of the history matching to model parameters. It also measures the interaction of the parameters in affecting the objective function. The basic premise of PC analysis is to isolate the most sensitive and least correlated regions. The eigenvectors obtained during the PCA are suitably scaled and appropriate grid block volume cut-offs are defined such that the resultant domains are neither too large (which increases interactions between domains) nor too small (implying ineffective history matching). The delineation of domains requires calculation of Hessian, which could be computationally costly and as well as restricts the current

  7. History Matching in Parallel Computational Environments

    Energy Technology Data Exchange (ETDEWEB)

    Steven Bryant; Sanjay Srinivasan; Alvaro Barrera; Sharad Yadav

    2005-10-01

    A novel methodology for delineating multiple reservoir domains for the purpose of history matching in a distributed computing environment has been proposed. A fully probabilistic approach to perturb permeability within the delineated zones is implemented. The combination of robust schemes for identifying reservoir zones and distributed computing significantly increase the accuracy and efficiency of the probabilistic approach. The information pertaining to the permeability variations in the reservoir that is contained in dynamic data is calibrated in terms of a deformation parameter rD. This information is merged with the prior geologic information in order to generate permeability models consistent with the observed dynamic data as well as the prior geology. The relationship between dynamic response data and reservoir attributes may vary in different regions of the reservoir due to spatial variations in reservoir attributes, well configuration, flow constrains etc. The probabilistic approach then has to account for multiple r{sub D} values in different regions of the reservoir. In order to delineate reservoir domains that can be characterized with different rD parameters, principal component analysis (PCA) of the Hessian matrix has been done. The Hessian matrix summarizes the sensitivity of the objective function at a given step of the history matching to model parameters. It also measures the interaction of the parameters in affecting the objective function. The basic premise of PC analysis is to isolate the most sensitive and least correlated regions. The eigenvectors obtained during the PCA are suitably scaled and appropriate grid block volume cut-offs are defined such that the resultant domains are neither too large (which increases interactions between domains) nor too small (implying ineffective history matching). The delineation of domains requires calculation of Hessian, which could be computationally costly and as well as restricts the current approach to

  8. Computer Programs.

    Science.gov (United States)

    Anderson, Tiffoni

    This module provides information on development and use of a Material Safety Data Sheet (MSDS) software program that seeks to link literacy skills education, safety training, and human-centered design. Section 1 discusses the development of the software program that helps workers understand the MSDSs that accompany the chemicals with which they…

  9. The freetext matching algorithm: a computer program to extract diagnoses and causes of death from unstructured text in electronic health records.

    Science.gov (United States)

    Shah, Anoop D; Martinez, Carlos; Hemingway, Harry

    2012-08-07

    Electronic health records are invaluable for medical research, but much information is stored as free text rather than in a coded form. For example, in the UK General Practice Research Database (GPRD), causes of death and test results are sometimes recorded only in free text. Free text can be difficult to use for research if it requires time-consuming manual review. Our aim was to develop an automated method for extracting coded information from free text in electronic patient records. We reviewed the electronic patient records in GPRD of a random sample of 3310 patients who died in 2001, to identify the cause of death. We developed a computer program called the Freetext Matching Algorithm (FMA) to map diagnoses in text to the Read Clinical Terminology. The program uses lookup tables of synonyms and phrase patterns to identify diagnoses, dates and selected test results. We tested it on two random samples of free text from GPRD (1000 texts associated with death in 2001, and 1000 general texts from cases and controls in a coronary artery disease study), comparing the output to the U.S. National Library of Medicine's MetaMap program and the gold standard of manual review. Among 3310 patients registered in the GPRD who died in 2001, the cause of death was recorded in coded form in 38.1% of patients, and in the free text alone in 19.4%. On the 1000 texts associated with death, FMA coded 683 of the 735 positive diagnoses, with precision (positive predictive value) 98.4% (95% confidence interval (CI) 97.2, 99.2) and recall (sensitivity) 92.9% (95% CI 90.8, 94.7). On the general sample, FMA detected 346 of the 447 positive diagnoses, with precision 91.5% (95% CI 88.3, 94.1) and recall 77.4% (95% CI 73.2, 81.2), which was similar to MetaMap. We have developed an algorithm to extract coded information from free text in GP records with good precision. It may facilitate research using free text in electronic patient records, particularly for extracting the cause of death.

  10. The urology residency matching program in practice.

    Science.gov (United States)

    Teichman, J M; Anderson, K D; Dorough, M M; Stein, C R; Optenberg, S A; Thompson, I M

    2000-06-01

    We evaluate behaviors and attitudes among resident applicants and program directors related to the American Urological Association (AUA) residency matching program and recommend changes to improve the match. Written questionnaires were mailed to 519 resident applicants and 112 program directors after the 1999 American Urological Association match. Subjects were asked about their observations, behaviors and opinions towards the match. Questionnaires were returned by 230 resident applicants and 94 program directors (44% and 83% response rates, respectively.) Of the resident applicants 75% spent $1,001 to $5,000 for interviewing. Of the program directors 47% recalled that applicants asked how programs would rank the applicant and 61% of applicants recalled that program directors asked applicants how they would rank programs. Dishonesty was acknowledged by 31% of program directors and 44% of resident applicants. Of program directors 82% thought applicants "lied", while 67% of applicants thought that programs "lied" (quotations indicate questionnaire language). Participants characterized their own dishonesty as "just playing the game" or they "did not feel badly." Of program directors 81% and of applicants 61% were "skeptical" or "did not believe" when informed they were a "high" or "number 1" selection. Being asked about marital status was recalled by 91% of male and 100% of female (p = 0. 02), if they had children by 53% of male and 67% of female, (p = 0. 03), and intent to have children by 25% of male and 62% of female (p gender. Interviews are costly for applicants. We recommend that 1) programs adopt policies to enhance fairness, 2) applications be filed electronically, 3) programs assist resident applicants with interview accommodation to reduce financial burden and 4) a post-interview code of limited or noncommunication be adopted.

  11. 78 FR 47830 - Privacy Act of 1974; Report of Matching Program

    Science.gov (United States)

    2013-08-06

    ...: Notice of Computer Matching Program. SUMMARY: The Department of Veterans Affairs (VA) provides notice that it intends to conduct a recurring computer matching program matching Railroad Retirement Board... will disclose the necessary information from RRB-26: Payment, Rate, and Entitlement History File...

  12. Computer programming and computer systems

    CERN Document Server

    Hassitt, Anthony

    1966-01-01

    Computer Programming and Computer Systems imparts a "reading knowledge? of computer systems.This book describes the aspects of machine-language programming, monitor systems, computer hardware, and advanced programming that every thorough programmer should be acquainted with. This text discusses the automatic electronic digital computers, symbolic language, Reverse Polish Notation, and Fortran into assembly language. The routine for reading blocked tapes, dimension statements in subroutines, general-purpose input routine, and efficient use of memory are also elaborated.This publication is inten

  13. ICASE Computer Science Program

    Science.gov (United States)

    1985-01-01

    The Institute for Computer Applications in Science and Engineering computer science program is discussed in outline form. Information is given on such topics as problem decomposition, algorithm development, programming languages, and parallel architectures.

  14. History Matching in Parallel Computational Environments

    Energy Technology Data Exchange (ETDEWEB)

    Steven Bryant; Sanjay Srinivasan; Alvaro Barrera; Sharad Yadav

    2004-08-31

    In the probabilistic approach for history matching, the information from the dynamic data is merged with the prior geologic information in order to generate permeability models consistent with the observed dynamic data as well as the prior geology. The relationship between dynamic response data and reservoir attributes may vary in different regions of the reservoir due to spatial variations in reservoir attributes, fluid properties, well configuration, flow constrains on wells etc. This implies probabilistic approach should then update different regions of the reservoir in different ways. This necessitates delineation of multiple reservoir domains in order to increase the accuracy of the approach. The research focuses on a probabilistic approach to integrate dynamic data that ensures consistency between reservoir models developed from one stage to the next. The algorithm relies on efficient parameterization of the dynamic data integration problem and permits rapid assessment of the updated reservoir model at each stage. The report also outlines various domain decomposition schemes from the perspective of increasing the accuracy of probabilistic approach of history matching. Research progress in three important areas of the project are discussed: {lg_bullet}Validation and testing the probabilistic approach to incorporating production data in reservoir models. {lg_bullet}Development of a robust scheme for identifying reservoir regions that will result in a more robust parameterization of the history matching process. {lg_bullet}Testing commercial simulators for parallel capability and development of a parallel algorithm for history matching.

  15. Programming in biomolecular computation

    DEFF Research Database (Denmark)

    Hartmann, Lars Røeboe; Jones, Neil; Simonsen, Jakob Grue

    2011-01-01

    Our goal is to provide a top-down approach to biomolecular computation. In spite of widespread discussion about connections between biology and computation, one question seems notable by its absence: Where are the programs? We identify a number of common features in programming that seem...... conspicuously absent from the literature on biomolecular computing; to partially redress this absence, we introduce a model of computation that is evidently programmable, by programs reminiscent of low-level computer machine code; and at the same time biologically plausible: its functioning is defined...... by a single and relatively small set of chemical-like reaction rules. Further properties: the model is stored-program: programs are the same as data, so programs are not only executable, but are also compilable and interpretable. It is universal: all computable functions can be computed (in natural ways...

  16. Computing the Matched Filter in Linear Time

    CERN Document Server

    Fish, Alexander; Hadani, Ronny; Sayeed, Akbar; Schwartz, Oded

    2011-01-01

    A fundamental problem in wireless communication is the time-frequency shift (TFS) problem: Find the time-frequency shift of a signal in a noisy environment. The shift is the result of time asynchronization of a sender with a receiver, and of non-zero speed of a sender with respect to a receiver. A classical solution of a discrete analog of the TFS problem is called the matched filter algorithm. It uses a pseudo-random waveform S(t) of the length p, and its arithmetic complexity is O(p^{2} \\cdot log (p)), using fast Fourier transform. In these notes we introduce a novel approach of designing new waveforms that allow faster matched filter algorithm. We use techniques from group representation theory to design waveforms S(t), which enable us to introduce two fast matched filter (FMF) algorithms, called the flag algorithm, and the cross algorithm. These methods solve the TFS problem in O(p\\cdot log (p)) operations. We discuss applications of the algorithms to mobile communication, GPS, and radar.

  17. Programming in biomolecular computation

    DEFF Research Database (Denmark)

    Hartmann, Lars Røeboe; Jones, Neil; Simonsen, Jakob Grue

    2010-01-01

    Our goal is to provide a top-down approach to biomolecular computation. In spite of widespread discussion about connections between biology and computation, one question seems notable by its absence: Where are the programs? We introduce a model of computation that is evidently programmable......, by programs reminiscent of low-level computer machine code; and at the same time biologically plausible: its functioning is defined by a single and relatively small set of chemical-like reaction rules. Further properties: the model is stored-program: programs are the same as data, so programs are not only...... in a strong sense: a universal algorithm exists, that is able to execute any program, and is not asymptotically inefficient. A prototype model has been implemented (for now in silico on a conventional computer). This work opens new perspectives on just how computation may be specified at the biological level....

  18. Flexible Animation Computer Program

    Science.gov (United States)

    Stallcup, Scott S.

    1990-01-01

    FLEXAN (Flexible Animation), computer program animating structural dynamics on Evans and Sutherland PS300-series graphics workstation with VAX/VMS host computer. Typical application is animation of spacecraft undergoing structural stresses caused by thermal and vibrational effects. Displays distortions in shape of spacecraft. Program displays single natural mode of vibration, mode history, or any general deformation of flexible structure. Written in FORTRAN 77.

  19. Computer Security Assistance Program

    Science.gov (United States)

    1997-09-01

    Information COMPUTER SECURITY ASSISTANCE PROGRAM OPR: HQ AFCA/SYS (CMSgt Hogan) Certified by: HQ USAF/SCXX (Lt Col Francis X. McGovern) Pages: 5...Distribution: F This instruction implements Air Force Policy Directive (AFPD) 33-2, Information Protection, establishes the Air Force Computer Security Assistance...Force single point of contact for reporting and handling computer security incidents and vulnerabilities including AFCERT advisories and Defense

  20. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    DEFF Research Database (Denmark)

    Hazay, Carmit; Toft, Tomas

    2014-01-01

    We propose a protocol for the problem of secure two-party pattern matching, where Alice holds a text t∈{0,1}∗ of length n, while Bob has a pattern p∈{0,1}∗ of length m. The goal is for Bob to (only) learn where his pattern occurs in Alice’s text, while Alice learns nothing. Private pattern matching...... for important variations of the secure pattern matching problem that are significantly more efficient than the current state of art solutions: First, we deal with secure pattern matching with wildcards. In this variant the pattern may contain wildcards that match both 0 and 1. Our protocol requires O......(n+m) communication and O(1) rounds using O(nm) computation. Then we treat secure approximate pattern matching. In this variant the matches may be approximated, i.e., have Hamming distance less than some threshold, τ. Our protocol requires O(nτ) communication in O(1) rounds using O(nm) computation. Third, we have...

  1. 32 CFR 310.53 - Computer matching agreements (CMAs).

    Science.gov (United States)

    2010-07-01

    ... sound management practices. The analysis provides an opportunity to examine the programs and to reject... with the terms of the CMA. (13) Cost-benefit analysis. (i) A cost-benefit analysis shall be conducted..., or (B) The matching program is required by a specific statute. (ii) The analysis must demonstrate...

  2. Template matching techniques in computer vision theory and practice

    CERN Document Server

    Brunelli, Roberto

    2009-01-01

    The detection and recognition of objects in images is a key research topic in the computer vision community.  Within this area, face recognition and interpretation has attracted increasing attention owing to the possibility of unveiling human perception mechanisms, and for the development of practical biometric systems. This book and the accompanying website, focus on template matching, a subset of object recognition techniques of wide applicability, which has proved to be particularly effective for face recognition applications. Using examples from face processing tasks throughout the book to illustrate more general object recognition approaches, Roberto Brunelli: examines the basics of digital image formation, highlighting points critical to the task of template matching;presents basic and  advanced template matching techniques, targeting grey-level images, shapes and point sets;discusses recent pattern classification paradigms from a template matching perspective;illustrates the development of a real fac...

  3. A computationally efficient approach for template matching-based ...

    Indian Academy of Sciences (India)

    Image registration using template matching is an important step in image processing. In this paper, a simple, robust and computationally efficient approach is presented. The proposed approach is based on the properties of a normalized covariance matrix. The main advantage of the proposed approach is that the image ...

  4. Fast unambiguous stereo matching using reliability-based dynamic programming.

    Science.gov (United States)

    Gong, Minglun; Yang, Yee-Hong

    2005-06-01

    An efficient unambiguous stereo matching technique is presented in this paper. Our main contribution is to introduce a new reliability measure to dynamic programming approaches in general. For stereo vision application, the reliability of a proposed match on a scanline is defined as the cost difference between the globally best disparity assignment that includes the match and the globally best assignment that does not include the match. A reliability-based dynamic programming algorithm is derived accordingly, which can selectively assign disparities to pixels when the corresponding reliabilities exceed a given threshold. The experimental results show that the new approach can produce dense (> 70 percent of the unoccluded pixels) and reliable (error rate < 0.5 percent) matches efficiently (< 0.2 sec on a 2GHz P4) for the four Middlebury stereo data sets.

  5. Computer Assisted Parallel Program Generation

    CERN Document Server

    Kawata, Shigeo

    2015-01-01

    Parallel computation is widely employed in scientific researches, engineering activities and product development. Parallel program writing itself is not always a simple task depending on problems solved. Large-scale scientific computing, huge data analyses and precise visualizations, for example, would require parallel computations, and the parallel computing needs the parallelization techniques. In this Chapter a parallel program generation support is discussed, and a computer-assisted parallel program generation system P-NCAS is introduced. Computer assisted problem solving is one of key methods to promote innovations in science and engineering, and contributes to enrich our society and our life toward a programming-free environment in computing science. Problem solving environments (PSE) research activities had started to enhance the programming power in 1970's. The P-NCAS is one of the PSEs; The PSE concept provides an integrated human-friendly computational software and hardware system to solve a target ...

  6. An Experimental Test of the LEADER MATCH Training Program.

    Science.gov (United States)

    Frost, Dean E.

    Fiedler's Contingency Model of Leadership Effectiveness, which asserts that leadership effectiveness is a function of leadership style and situational context, is the basis for a leadership training program called Leader Match. This study attempts to replicate previous research which has demonstrated improved performance attributable to the Leader…

  7. Assessing the accuracy of computer color matching with a new dental porcelain shade system.

    Science.gov (United States)

    Wang, Jian; Lin, Jin; Gil, Mindy; Seliger, Alison; Da Silva, John D; Ishikawa-Nagai, Shigemi

    2014-03-01

    In a previous study, a novel computer color matching system for dental ceramic restoration was developed, and 21 new shades were established. Theoretically, a natural tooth color can be accurately reproduced by combining 2 or 3 ceramic mixtures from the database of 21 new shades. The purpose of this study was to test the use of these shades in conjunction with the computer color matching system to determine their ability to accurately reproduce the body color of 29 shade tabs from a shade guide (VITAPAN 3D-Master). Disks of 21 reference shades were prepared with porcelain (Cerabien CZR) and polished to 1.0 mm thickness. A spectrophotometer was used to measure the reflectance values from 380 to 780 nm for each disk; the scattering coefficient and absorption coefficient were determined. By using the reflectance values and the scattering and absorption coefficients, the computer color matching program generated porcelain prescriptions incorporating proportions from the 21 reference shades to reproduce the shade tabs. Disks were fabricated from the prescriptions, polished to 1.0 mm thickness, then placed over a zirconia core plate and measured with the spectrophotometer. The color differences (ΔE*) between the shade tabs and the corresponding ceramic disks were calculated. Statistical analysis was performed with the 1-sample t test. The ΔE* values between computer color matching specimens and the target shade tabs varied from 0.5 to 1.9, with an average ΔE* of 1.3, which was significantly less than the clinically detectable ΔE* threshold of 1.6 (P<.001). The computer color matching system with the established 21 new shades is accurate and effective for reproducing tooth shades. Copyright © 2014 Editorial Council for the Journal of Prosthetic Dentistry. Published by Elsevier Inc. All rights reserved.

  8. Matched experimental and computational simulations of paintball eye impacts.

    Science.gov (United States)

    Kennedy, Eric A; Stitzel, Joel D; Duma, Stefan M

    2008-01-01

    Over 1200 paintball related eye injuries are treated every year in US emergency departments. These injuries can be manifested as irritation from paint splatter in the eye to catastrophic rupture of the globe. Using the Virginia Tech - Wake Forest University Eye Model, experimental paintball impacts were replicated and the experimental and computational results compared. A total of 10 paintball impacts were conducted from a range of 71.1 m/s to 112.5 m/s. All experimental tests resulted in rupture of the globe. The matched computational simulations also predicted near-failure or failure in each of the simulations, with a maximum principal stress of greater than 22.8 MPa in all scenarios, over 23 MPa for velocities above 73 m/s. Failure stress for the VT-WFU Eye Model is defined as 23 MPa. The current regulation velocity for paintballs of 91 m/s exceeds the tolerance of the eye to globe rupture and underscores the importance for eyewear in this sport.

  9. Computer programs as accounting object

    Directory of Open Access Journals (Sweden)

    I.V. Perviy

    2015-03-01

    Full Text Available Existing approaches to the regulation of accounting software as one of the types of intangible assets have been considered. The features and current state of the legal protection of computer programs have been analyzed. The reasons for the need to use patent law as a means of legal protection of individual elements of computer programs have been discovered. The influence of the legal aspects of the use of computer programs for national legislation to their accounting reflection has been analyzed. The possible options for the transfer of rights from computer programs copyright owners have been analyzed that should be considered during creation of software accounting system at the enterprise. Identified and analyzed the characteristics of computer software as an intangible asset under the current law. General economic characteristics of computer programs as one of the types of intangible assets have been grounded. The main distinguishing features of software compared to other types of intellectual property have been all ocated

  10. A programming approach to computability

    CERN Document Server

    Kfoury, A J; Arbib, Michael A

    1982-01-01

    Computability theory is at the heart of theoretical computer science. Yet, ironically, many of its basic results were discovered by mathematical logicians prior to the development of the first stored-program computer. As a result, many texts on computability theory strike today's computer science students as far removed from their concerns. To remedy this, we base our approach to computability on the language of while-programs, a lean subset of PASCAL, and postpone consideration of such classic models as Turing machines, string-rewriting systems, and p. -recursive functions till the final chapter. Moreover, we balance the presentation of un solvability results such as the unsolvability of the Halting Problem with a presentation of the positive results of modern programming methodology, including the use of proof rules, and the denotational semantics of programs. Computer science seeks to provide a scientific basis for the study of information processing, the solution of problems by algorithms, and the design ...

  11. Kangaroo – A pattern-matching program for biological sequences

    Directory of Open Access Journals (Sweden)

    Betel Doron

    2002-07-01

    Full Text Available Abstract Background Biologists are often interested in performing a simple database search to identify proteins or genes that contain a well-defined sequence pattern. Many databases do not provide straightforward or readily available query tools to perform simple searches, such as identifying transcription binding sites, protein motifs, or repetitive DNA sequences. However, in many cases simple pattern-matching searches can reveal a wealth of information. We present in this paper a regular expression pattern-matching tool that was used to identify short repetitive DNA sequences in human coding regions for the purpose of identifying potential mutation sites in mismatch repair deficient cells. Results Kangaroo is a web-based regular expression pattern-matching program that can search for patterns in DNA, protein, or coding region sequences in ten different organisms. The program is implemented to facilitate a wide range of queries with no restriction on the length or complexity of the query expression. The program is accessible on the web at http://bioinfo.mshri.on.ca/kangaroo/ and the source code is freely distributed at http://sourceforge.net/projects/slritools/. Conclusion A low-level simple pattern-matching application can prove to be a useful tool in many research settings. For example, Kangaroo was used to identify potential genetic targets in a human colorectal cancer variant that is characterized by a high frequency of mutations in coding regions containing mononucleotide repeats.

  12. Tempest: GPU-CPU computing for high-throughput database spectral matching.

    Science.gov (United States)

    Milloy, Jeffrey A; Faherty, Brendan K; Gerber, Scott A

    2012-07-06

    Modern mass spectrometers are now capable of producing hundreds of thousands of tandem (MS/MS) spectra per experiment, making the translation of these fragmentation spectra into peptide matches a common bottleneck in proteomics research. When coupled with experimental designs that enrich for post-translational modifications such as phosphorylation and/or include isotopically labeled amino acids for quantification, additional burdens are placed on this computational infrastructure by shotgun sequencing. To address this issue, we have developed a new database searching program that utilizes the massively parallel compute capabilities of a graphical processing unit (GPU) to produce peptide spectral matches in a very high throughput fashion. Our program, named Tempest, combines efficient database digestion and MS/MS spectral indexing on a CPU with fast similarity scoring on a GPU. In our implementation, the entire similarity score, including the generation of full theoretical peptide candidate fragmentation spectra and its comparison to experimental spectra, is conducted on the GPU. Although Tempest uses the classical SEQUEST XCorr score as a primary metric for evaluating similarity for spectra collected at unit resolution, we have developed a new "Accelerated Score" for MS/MS spectra collected at high resolution that is based on a computationally inexpensive dot product but exhibits scoring accuracy similar to that of the classical XCorr. In our experience, Tempest provides compute-cluster level performance in an affordable desktop computer.

  13. Tempest: GPU-CPU computing for high-throughput database spectral matching

    Science.gov (United States)

    Milloy, Jeffrey A.; Faherty, Brendan K.; Gerber, Scott A.

    2012-01-01

    Modern mass spectrometers are now capable of producing hundreds of thousands of tandem (MS/MS) spectra per experiment, making the translation of these fragmentation spectra into peptide matches a common bottleneck in proteomics research. When coupled with experimental designs that enrich for post-translational modifications such as phosphorylation and/or include isotopically-labeled amino acids for quantification, additional burdens are placed on this computational infrastructure by shotgun sequencing. To address this issue, we have developed a new database searching program that utilizes the massively parallel compute capabilities of a graphical processing unit (GPU) to produce peptide spectral matches in a very high throughput fashion. Our program, named Tempest, combines efficient database digestion and MS/MS spectral indexing on a CPU with fast similarity scoring on a GPU. In our implementation, the entire similarity score, including the generation of full theoretical peptide candidate fragmentation spectra and its comparison to experimental spectra, is conducted on the GPU. Although Tempest uses the classical SEQUEST XCorr score as a primary metric for evaluating similarity for spectra collected at unit resolution, we have developed a new “Accelerated Score” for MS/MS spectra collected at high resolution that is based on a computationally inexpensive dot product but exhibits scoring accuracy similar to the classical XCorr. In our experience, Tempest provides compute-cluster level performance in an affordable desktop computer. PMID:22640374

  14. Results of the 2010 national resident matching program: family medicine.

    Science.gov (United States)

    Pugno, Perry A; McGaha, Amy L; Schmittling, Gordon T; DeVilbiss Bieck, Ashley D; Crosley, Philip W; Ostergaard, Daniel J

    2010-09-01

    The results of the 2010 National Resident Matching Program (NRMP) reflect a small but promising increased level of student interest in family medicine residency training in the United States. Compared with the 2009 Match, 75 more positions (with 101 more US seniors) were filled in family medicine residency programs through the NRMP in 2010, at the same time that seven more positions were filled in primary care internal medicine (one more US senior), 14 fewer positions were filled in pediatrics-primary care (16 fewer US seniors), and 16 more positions were filled in internal medicine-pediatrics programs (58 more US seniors). Multiple forces including student perspectives of the demands, rewards, and prestige of the specialty; national dialogue about health care reform; turbulence in the economic environment; lifestyle issues; the advice of deans; and the impact of faculty role models continue to influence medical student career choices. Ninety-four more positions (90 more US seniors) were filled in categorical internal medicine. Fifty-seven more positions (29 more US seniors) were filled in categorical pediatrics programs. The 2010 NRMP results suggest that there is a small increase in primary care careers; however, students continue to show an overall preference for subspecialty careers. Despite matching the highest number of US seniors into family medicine residencies since 2004, in 2010 the production of family physicians remains insufficient to meet the current and anticipated need to support the nation's primary care infrastructure.

  15. Results of the 2009 National Resident Matching Program: family medicine.

    Science.gov (United States)

    Pugno, Perry A; McGaha, Amy L; Schmittling, Gordon T; DeVilbiss, Ashley D; Ostergaard, Daniel J

    2009-09-01

    The results of the 2009 National Resident Matching Program (NRMP) reflect a persistently low level of student interest in family medicine residency training in the United States. Compared with the 2008 Match, 70 fewer positions (with 89 fewer US seniors) were filled in family medicine residency programs through the NRMP in 2009, at the same time that 18 fewer positions were filled in primary care internal medicine (11 fewer US seniors), one more position was filled in pediatrics-primary care (three more US seniors), and 13 more positions were filled in internal medicine-pediatrics programs (but with seven fewer US seniors). Multiple forces, including student perspectives of the demands, rewards and prestige of the specialty, the turbulence and uncertainty of the health care and economic environments, lifestyle issues, the advice of deans, and the impact of faculty role models, continue to influence medical student career choices. A total of 152 more positions (28 fewer US seniors) were filled in categorical internal medicine. Thirty-one more positions (72 more US seniors) were filled in categorical pediatrics programs. The 2009 NRMP results suggest that while interest in family medicine experienced a slight increase in the number of students choosing the specialty last year, overall interest in primary care careers continues to decline. With the nation continuing to call for the roles and services of family physicians, family medicine still matched too few graduates through the 2009 NRMP to effectively address the nation's needs for primary care physicians.

  16. Results of the 2008 National Resident Matching Program: family medicine.

    Science.gov (United States)

    Pugno, Perry A; McGaha, Amy L; Schmittling, Gordon T; DeVilbiss, Ashley D; Ostergaard, Daniel J

    2008-09-01

    The results of the 2008 National Resident Matching Program (NRMP) reflect a currently stable level of student interest in family medicine residency training in the United States. Compared with the 2007 Match, 91 more positions (with 65 more US seniors) were filled in family medicine residency programs through the NRMP in 2008, at the same time as 10 fewer (one fewer US senior) in primary care internal medicine, eight fewer positions were filled in pediatrics-primary care (10 fewer US seniors), and 19 fewer (27 fewer US seniors) in internal medicine-pediatrics programs. Multiple forces, including student perspectives of the demands, rewards, and prestige of the specialty, the turbulence and uncertainty of the health care environment, lifestyle issues, and the impact of faculty role models, continue to influence medical student career choices. Thirty-one more positions (20 fewer US seniors) were filled in categorical internal medicine. Thirty more positions (84 fewer US seniors) were filled in categorical pediatrics programs. The 2008 NRMP results suggest that while interest in family medicine experienced a slight increase in the number of students choosing the specialty, interest in other primary care careers continues to decline. With the needs of the nation calling for the roles and services of family physicians, family medicine still matched too few graduates through the 2008 NRMP to meet the nation's needs for primary care physicians.

  17. Computer Program Newsletter No. 7

    Energy Technology Data Exchange (ETDEWEB)

    Magnuson, W.G. Jr.

    1982-09-01

    This issue of the Computer Program Newsletter updates an earlier newsletter (Number 2, September 1979) and focuses on electrical network analysis computer programs. In particular, five network analysis programs (SCEPTRE, SPICE2, NET2, CALAHAN, and EMTP) will be described. The objective of this newsletter will be to provide a very brief description of the input syntax and semantics for each program, highlight their strong and weak points, illustrate how the programs are run at Lawrence Livermore National Laboratory using the Octopus computer network, and present examples of input for each of the programs to illustrate some of the features of each program. In a sense, this newsletter can be used as a quick reference guide to the programs.

  18. NASA's computer science research program

    Science.gov (United States)

    Larsen, R. L.

    1983-01-01

    Following a major assessment of NASA's computing technology needs, a new program of computer science research has been initiated by the Agency. The program includes work in concurrent processing, management of large scale scientific databases, software engineering, reliable computing, and artificial intelligence. The program is driven by applications requirements in computational fluid dynamics, image processing, sensor data management, real-time mission control and autonomous systems. It consists of university research, in-house NASA research, and NASA's Research Institute for Advanced Computer Science (RIACS) and Institute for Computer Applications in Science and Engineering (ICASE). The overall goal is to provide the technical foundation within NASA to exploit advancing computing technology in aerospace applications.

  19. A cross-scale constrained dynamic programming algorithm for stereo matching

    Science.gov (United States)

    Cheng, Sipei; Da, Feipeng; Yu, Jian; Huang, Yuan; Gai, Shaoyan

    2017-06-01

    Stereo matching is an important and hot research topic in computer vision. In order to solve the well-known streaking effects of dynamic programming, and reduce the mismatch points on edges, discontinuous and textureless regions, we propose a cross-scale constrained dynamic programming algorithm for stereo matching. The algorithm involves both image pyramid model and Gaussian scale space to operate a coarse-to-fine dynamic programming on multi-scale cost volumes. For the purpose of improving the disparity accuracy in textureless region, a cross-scale regularized constraint is added to ensure the cost consistency, the computational burden is reduced by using the disparity estimation from lower scale operation to seed the search on the larger image. Both synthetic and real scene experimental results show our algorithm can effectively reduce the mismatch in textureless regions.

  20. Results of the 2011 National Resident Matching Program: family medicine.

    Science.gov (United States)

    Biggs, Wendy S; Bieck, Ashley D; Pugno, Perry A; Crosley, Philip W

    2011-10-01

    The results of the 2011 National Resident Matching Program (NRMP) reflect another small but promising increased level of student interest in family medicine residency training in the United States. Compared with the 2010 Match, family medicine residency programs filled 172 more positions (with 133 more US seniors) through the NRMP in 2011. In other primary care fields, 26 more primary care internal medicine positions filled (10 more US seniors), one more position in pediatrics-primary care (two fewer US seniors), and seven more positions in internal medicine-pediatrics programs (10 more US seniors). The 2011 NRMP results suggest a small increase in choosing primary care careers for the second year in a row; however, students continue to show an overall preference for subspecialty careers. Multiple forces continue to influence medical student career choices. Despite matching the highest number of US seniors into family medicine residencies since 2002, the production of family physicians remains insufficient to meet the current and anticipated need to support the nation's primary care infrastructure.

  1. Treating Juveniles in a Sex Offender Program Using Adventure-Based Programming: A Matched Group Design

    Science.gov (United States)

    Gillis, H. L.; Gass, Michael A.

    2010-01-01

    Ninety-five male juvenile sex offenders in an adventure-based behavior management program (LEGACY) were matched with male juveniles in state treatment-as-usual and other specialized programs in the same state to determine program effectiveness (as measured by rearrest rates). The LEGACY program demonstrated significant treatment effectiveness on…

  2. Designing computer programs

    CERN Document Server

    Haigh, Jim

    1994-01-01

    This is a book for students at every level who are learning to program for the first time - and for the considerable number who learned how to program but were never taught to structure their programs. The author presents a simple set of guidelines that show the programmer how to design in a manageable structure from the outset. The method is suitable for most languages, and is based on the widely used 'JSP' method, to which the student may easily progress if it is needed at a later stage.Most language specific texts contain very little if any information on design, whilst books on des

  3. Computer Program NIKE

    DEFF Research Database (Denmark)

    Spanget-Larsen, Jens

    2014-01-01

    FORTRAN source code for program NIKE (PC version of QCPE 343). Sample input and output for two model chemical reactions are appended: I. Three consecutive monomolecular reactions, II. A simple chain mechanism...

  4. Line-Editor Computer Program

    Science.gov (United States)

    Scott, Peter J.

    1989-01-01

    ZED editing program for DEC VAX computer simple, powerful line editor for text, program source code, and nonbinary data. Excels in processing of text by use of procedure files. Also features versatile search qualifiers, global changes, conditionals, online help, hexadecimal mode, space compression, looping, logical combinations of search strings, journaling, visible control characters, and automatic detabbing. Users of Cambridge implementation devised such ZED procedures as chess games, calculators, and programs for evaluating pi. Written entirely in C.

  5. An Algorithm to Compute the Character Access Count Distribution for Pattern Matching Algorithms

    NARCIS (Netherlands)

    T. Marschall (Tobias); S. Rahmann (Sven)

    2011-01-01

    textabstractWe propose a framework for the exact probabilistic analysis of window-based pattern matching algorithms, such as Boyer--Moore, Horspool, Backward DAWG Matching, Backward Oracle Matching, and more. In particular, we develop an algorithm that efficiently computes the distribution of a

  6. The psychology of computer programming

    CERN Document Server

    Weinberg, Gerald Marvin

    1998-01-01

    This landmark 1971 classic is reprinted with a new preface, chapter-by-chapter commentary, and straight-from-the-heart observations on topics that affect the professional life of programmers. Long regarded as one of the first books to pioneer a people-oriented approach to computing, The Psychology of Computer Programming endures as a penetrating analysis of the intelligence, skill, teamwork, and problem-solving power of the computer programmer. Finding the chapters strikingly relevant to today's issues in programming, Gerald M. Weinberg adds new insights and highlights the similarities and differences between now and then. Using a conversational style that invites the reader to join him, Weinberg reunites with some of his most insightful writings on the human side of software engineering. Topics include egoless programming, intelligence, psychological measurement, personality factors, motivation, training, social problems on large projects, problem-solving ability, programming language design, team formati...

  7. 76 FR 48811 - Computer Matching and Privacy Protection Act of 1988

    Science.gov (United States)

    2011-08-09

    ... AND COMMUNITY SERVICE Computer Matching and Privacy Protection Act of 1988 AGENCY: Corporation for... Privacy Act of 1974 (5 U.S.C. 552a), as amended by the Computer Matching and Privacy Protection Act of... Privacy Protection Act of 1988 (54 FR 25818, June 19, 1989), and OMB Circular No. A-130, ``Management of...

  8. Functional Programming in Computer Science

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Loren James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Davis, Marion Kei [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-01-19

    We explore functional programming through a 16-week internship at Los Alamos National Laboratory. Functional programming is a branch of computer science that has exploded in popularity over the past decade due to its high-level syntax, ease of parallelization, and abundant applications. First, we summarize functional programming by listing the advantages of functional programming languages over the usual imperative languages, and we introduce the concept of parsing. Second, we discuss the importance of lambda calculus in the theory of functional programming. Lambda calculus was invented by Alonzo Church in the 1930s to formalize the concept of effective computability, and every functional language is essentially some implementation of lambda calculus. Finally, we display the lasting products of the internship: additions to a compiler and runtime system for the pure functional language STG, including both a set of tests that indicate the validity of updates to the compiler and a compiler pass that checks for illegal instances of duplicate names.

  9. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    DEFF Research Database (Denmark)

    Hazay, Carmit; Toft, Tomas

    2010-01-01

    We propose a dedicated protocol for the highly motivated problem of secure two-party pattern matching: Alice holds a text t ∈ {0,1}*. of length n, while Bob has a pattern p ∈ {0,1}*. of length m. The goal is for Bob to learn where his pattern occurs in Alice's text. Our construction guarantees full...

  10. Nuclear Forces and High-Performance Computing: The Perfect Match

    Energy Technology Data Exchange (ETDEWEB)

    Luu, T; Walker-Loud, A

    2009-06-12

    High-performance computing is now enabling the calculation of certain nuclear interaction parameters directly from Quantum Chromodynamics, the quantum field theory that governs the behavior of quarks and gluons and is ultimately responsible for the nuclear strong force. We briefly describe the state of the field and describe how progress in this field will impact the greater nuclear physics community. We give estimates of computational requirements needed to obtain certain milestones and describe the scientific and computational challenges of this field.

  11. 75 FR 58020 - Privacy Act of 1974; Report of Matching Program

    Science.gov (United States)

    2010-09-23

    ... change and that the matching program has been conducted in compliance with the original matching program... accurately identify beneficiaries who are incarcerated for a felony or a misdemeanor in a Federal penal...

  12. Sonic boom research. [computer program

    Science.gov (United States)

    Zakkay, V.; Ting, L.

    1976-01-01

    A computer program for CDC 6600 is developed for the nonlinear sonic boom analysis including the asymmetric effect of lift near the vertical plane of symmetry. The program is written in FORTRAN 4 language. This program carries out the numerical integration of the nonlinear governing equations from the input data at a finite distance from the airplane configuration at a flight altitude to yield the pressure signitude at ground. The required input data and the format for the output are described. A complete program listing and a sample calculation are given.

  13. Match and Move, an Approach to Data Parallel Computing

    Science.gov (United States)

    1992-10-01

    Machines Incorporated, 1990. [DNS81] Eliezer Dekel, David Nassimi, and Sartaj Sahni. Parallel matrix and graph algorithms. SIAM J. Comput., 10(4):657...series in artificial intelli- gence. MIT Press, Cambridge, Mass., 1985. [HJ88] R. W. Hockney and C. R. Jesshope. Parallel Computers 2: Architecture

  14. MATCHED FILTER COMPUTATION ON FPGA, CELL, AND GPU

    Energy Technology Data Exchange (ETDEWEB)

    BAKER, ZACHARY K. [Los Alamos National Laboratory; GOKHALE, MAYA B. [Los Alamos National Laboratory; TRIPP, JUSTIN L. [Los Alamos National Laboratory

    2007-01-08

    The matched filter is an important kernel in the processing of hyperspectral data. The filter enables researchers to sift useful data from instruments that span large frequency bands. In this work, they evaluate the performance of a matched filter algorithm implementation on accelerated co-processor (XD1000), the IBM Cell microprocessor, and the NVIDIA GeForce 6900 GTX GPU graphics card. They provide extensive discussion of the challenges and opportunities afforded by each platform. In particular, they explore the problems of partitioning the filter most efficiently between the host CPU and the co-processor. Using their results, they derive several performance metrics that provide the optimal solution for a variety of application situations.

  15. Risk-Assessment Computer Program

    Science.gov (United States)

    Dias, William C.; Mittman, David S.

    1993-01-01

    RISK D/C is prototype computer program assisting in attempts to do program risk modeling for Space Exploration Initiative (SEI) architectures proposed in Synthesis Group Report. Risk assessment performed with respect to risk events, probabilities, and severities of potential results. Enables ranking, with respect to effectiveness, of risk-mitigation strategies proposed for exploration program architecture. Allows for fact that risk assessment in early phases of planning subjective. Although specific to SEI in present form, also used as software framework for development of risk-assessment programs for other specific uses. Developed for Macintosh(TM) series computer. Requires HyperCard(TM) 2.0 or later, as well as 2 Mb of random-access memory and System 6.0.8 or later.

  16. The prediction in computer color matching of dentistry based on GA+BP neural network.

    Science.gov (United States)

    Li, Haisheng; Lai, Long; Chen, Li; Lu, Cheng; Cai, Qiang

    2015-01-01

    Although the use of computer color matching can reduce the influence of subjective factors by technicians, matching the color of a natural tooth with a ceramic restoration is still one of the most challenging topics in esthetic prosthodontics. Back propagation neural network (BPNN) has already been introduced into the computer color matching in dentistry, but it has disadvantages such as unstable and low accuracy. In our study, we adopt genetic algorithm (GA) to optimize the initial weights and threshold values in BPNN for improving the matching precision. To our knowledge, we firstly combine the BPNN with GA in computer color matching in dentistry. Extensive experiments demonstrate that the proposed method improves the precision and prediction robustness of the color matching in restorative dentistry.

  17. Elliptical Orbit Performance Computer Program

    Science.gov (United States)

    Myler, T.

    1984-01-01

    Elliptical Orbit Performance (ELOPE) computer program for analyzing orbital performance of space boosters uses orbit insertion data obtained from trajectory simulation to generate parametric data on apogee and perigee altitudes as function of payload data. Data used to generate presentation plots that display elliptical orbit performance capability of space booster.

  18. The Effectiveness of a Shade-Matching Training Program on the Dentists' Ability to Match Teeth Color.

    Science.gov (United States)

    Alkhudairy, Reem; Tashkandi, Esam

    2017-04-01

    To study the effectiveness of a structured shade-match training program on dentists' ability to match teeth colors. Forty dentists were selected by convenient sampling with normal color vision. The training program is based on visual attention concept and was divided into two parts (educational and training module). Level of knowledge of color was assessed pre and post using a questionnaire. Shade-matching ability was assessed pre and post by using four tabs of the VITA Linearguide 3D-MASTER shade guide (4R1.5, 5M1, 2L.15, 3L1.5). Statistical analysis used pair t test, Wilcoxon test. About 52.5% (n = 21) were female and 47.5% (n = 19) were male. The subjects were advanced general practitioners/GP and restorative dentists (40%, n = 16), and prosthodontists (20%, n = 8). The mean level of knowledge pre and post the training program showed a statistically significant difference (p ≤ 0.05). Shade-match ability was significant in the mean value between pre-test and post-test (p ≤ 0.05). The mean of ΔE for the shade-matching tabs was highest in 5M1 Tab (3.55 ± 2.91) followed by 4R1.5 (2.00 ± 1.30) and 2L1.5 (1.55 ± 1.40). The least ΔE was in 3L1.5 (1.54 ± 1.45). The training program that is based on visual attention was effective. The training program has increased self-assessment level of knowledge for all subjects and improved the final shade-matching performance. Visual shade matching is currently the most frequently applied clinical method for shade matching. Assessing colors and matching shades are vital steps in aesthetic dentistry. In the absence of knowledge, shade-matching skills cannot be mastered effectively. Clinicians can improve their ability to differentiate colors through a short training regimen. Being aware of the whole process of assessing color and the factors affecting shade-matching practice will lead to a significant improvement in the ability to match dental shades. (J Esthet Restor Dent 29:E33-E43

  19. A computationally efficient approach for template matching-based ...

    Indian Academy of Sciences (India)

    process is extensively useful in computer vision, medical imaging, automatic target recognition in military and analyzing the remote images obtained from the satellites (Zitová & Flusser 2003). In the last 10 years, many image registration methods have been proposed which are broadly classified into feature-based ...

  20. 77 FR 27263 - Computer Matching Between the Selective Service System and the Department of Education

    Science.gov (United States)

    2012-05-09

    ... From the Federal Register Online via the Government Publishing Office SELECTIVE SERVICE SYSTEM Computer Matching Between the Selective Service System and the Department of Education AGENCY: Selective... Selective Service System (SSS) and the Department of Education (ED). 2. Purpose of the Match The purpose of...

  1. Computational Complexity of Subspace Detectors and Matched Field Processing

    Energy Technology Data Exchange (ETDEWEB)

    Harris, D B

    2010-12-01

    Subspace detectors implement a correlation type calculation on a continuous (network or array) data stream [Harris, 2006]. The difference between subspace detectors and correlators is that the former projects the data in a sliding observation window onto a basis of template waveforms that may have a dimension (d) greater than one, and the latter projects the data onto a single waveform template. A standard correlation detector can be considered to be a degenerate (d=1) form of a subspace detector. Figure 1 below shows a block diagram for the standard formulation of a subspace detector. The detector consists of multiple multichannel correlators operating on a continuous data stream. The correlation operations are performed with FFTs in an overlap-add approach that allows the stream to be processed in uniform, consecutive, contiguous blocks. Figure 1 is slightly misleading for a calculation of computational complexity, as it is possible, when treating all channels with the same weighting (as shown in the figure), to perform the indicated summations in the multichannel correlators before the inverse FFTs and to get by with a single inverse FFT and overlap add calculation per multichannel correlator. In what follows, we make this simplification.

  2. Computer Education in Dental Laboratory Technology Programs.

    Science.gov (United States)

    Rogers, William A.; Hawkins, Robert Ross

    1991-01-01

    A 1990 survey of 37 dental technology programs investigated 3 areas of computer use: current and anticipated general computer education courses; incorporation of computer applications into technology and management courses; and faculty use of the computer. Most programs are beginning to expand use of technology. (MSE)

  3. Computer technology and computer programming research and strategies

    CERN Document Server

    Antonakos, James L

    2011-01-01

    Covering a broad range of new topics in computer technology and programming, this volume discusses encryption techniques, SQL generation, Web 2.0 technologies, and visual sensor networks. It also examines reconfigurable computing, video streaming, animation techniques, and more. Readers will learn about an educational tool and game to help students learn computer programming. The book also explores a new medical technology paradigm centered on wireless technology and cloud computing designed to overcome the problems of increasing health technology costs.

  4. 26 CFR 31.3406(j)-1 - Taxpayer Identification Number (TIN) matching program.

    Science.gov (United States)

    2010-04-01

    ... data base utilized for the particular matching program. For purposes of this section, the term payor... will be set forth in the guidance establishing the program. (e) Definition of account. Account means...

  5. Final report to DOE: Matching Grant Program for the Penn State University Nuclear Engineering Program

    Energy Technology Data Exchange (ETDEWEB)

    Jack S. Brenizer, Jr.

    2003-01-17

    The DOE/Industry Matching Grant Program is designed to encourage collaborative support for nuclear engineering education as well as research between the nation's nuclear industry and the U.S. Department of Energy (DOE). Despite a serious decline in student enrollments in the 1980s and 1990s, the discipline of nuclear engineering remained important to the advancement of the mission goals of DOE. The program is designed to ensure that academic programs in nuclear engineering are maintained and enhanced in universities throughout the U.S. At Penn State, the Matching Grant Program played a critical role in the survival of the Nuclear Engineering degree programs. Funds were used in a variety of ways to support both undergraduate and graduate students directly. Some of these included providing seed funding for new graduate research initiatives, funding the development of new course materials, supporting new teaching facilities, maintenance and purchase of teaching laboratory equipment, and providing undergraduate scholarships, graduate fellowships, and wage payroll positions for students.

  6. Use of the computer program in a cloud computing

    Directory of Open Access Journals (Sweden)

    Radovanović Sanja

    2013-01-01

    Full Text Available Cloud computing represents a specific networking, in which a computer program simulates the operation of one or more server computers. In terms of copyright, all technological processes that take place within the cloud computing are covered by the notion of copying computer programs, and exclusive right of reproduction. However, this right suffers some limitations in order to allow normal use of computer program by users. Based on the fact that the cloud computing is virtualized network, the issue of normal use of the computer program requires to put all aspects of the permitted copying into the context of a specific computing environment and specific processes within the cloud. In this sense, the paper pointed out that the user of a computer program in cloud computing, needs to obtain the consent of the right holder for any act which he undertakes using the program. In other words, the copyright in the cloud computing is a full scale, and thus the freedom of contract (in the case of this particular restriction as well.

  7. Personal Computer Transport Analysis Program

    Science.gov (United States)

    DiStefano, Frank, III; Wobick, Craig; Chapman, Kirt; McCloud, Peter

    2012-01-01

    The Personal Computer Transport Analysis Program (PCTAP) is C++ software used for analysis of thermal fluid systems. The program predicts thermal fluid system and component transients. The output consists of temperatures, flow rates, pressures, delta pressures, tank quantities, and gas quantities in the air, along with air scrubbing component performance. PCTAP s solution process assumes that the tubes in the system are well insulated so that only the heat transfer between fluid and tube wall and between adjacent tubes is modeled. The system described in the model file is broken down into its individual components; i.e., tubes, cold plates, heat exchangers, etc. A solution vector is built from the components and a flow is then simulated with fluid being transferred from one component to the next. The solution vector of components in the model file is built at the initiation of the run. This solution vector is simply a list of components in the order of their inlet dependency on other components. The component parameters are updated in the order in which they appear in the list at every time step. Once the solution vectors have been determined, PCTAP cycles through the components in the solution vector, executing their outlet function for each time-step increment.

  8. Debugging a high performance computing program

    Science.gov (United States)

    Gooding, Thomas M.

    2013-08-20

    Methods, apparatus, and computer program products are disclosed for debugging a high performance computing program by gathering lists of addresses of calling instructions for a plurality of threads of execution of the program, assigning the threads to groups in dependence upon the addresses, and displaying the groups to identify defective threads.

  9. Computer Assistance for Writing Interactive Programs: TICS

    Science.gov (United States)

    Kaplow, Ray; And Others

    1973-01-01

    A description of an on-line and interactive programing system (TICS - Teacher-Interactive-Computer-System), which is aimed at facilitating the authoring of interactive, instructional computer programs by persons who are experts on the subject matter being addressed, but not necessarily programers. (Author)

  10. The NASA computer science research program plan

    Science.gov (United States)

    1983-01-01

    A taxonomy of computer science is included, one state of the art of each of the major computer science categories is summarized. A functional breakdown of NASA programs under Aeronautics R and D, space R and T, and institutional support is also included. These areas were assessed against the computer science categories. Concurrent processing, highly reliable computing, and information management are identified.

  11. Integrated workflow for computer assisted history matching on a channelized reservoir

    NARCIS (Netherlands)

    Peters, E.; Wilschut, F.; Leeuwenburgh, O.; Hooff, P.M.E. van

    2011-01-01

    Increasingly computer assisted techniques are used for history matching reservoir models. Such methods will become indispensable in view of the increasing amount of information generated by intelligent wells, in which case manual interpretation becomes too time consuming. Also, with the increasing

  12. High performance computing and communications program

    Science.gov (United States)

    Holcomb, Lee

    1992-01-01

    A review of the High Performance Computing and Communications (HPCC) program is provided in vugraph format. The goals and objectives of this federal program are as follows: extend U.S. leadership in high performance computing and computer communications; disseminate the technologies to speed innovation and to serve national goals; and spur gains in industrial competitiveness by making high performance computing integral to design and production.

  13. What do reversible programs compute?

    DEFF Research Database (Denmark)

    Axelsen, Holger Bock; Glück, Robert

    2011-01-01

    are not strictly classically universal, but that they support another notion of universality; we call this RTM-universality. Thus, even though the RTMs are sub-universal in the classical sense, they are powerful enough as to include a self-interpreter. Lifting this to other computation models, we propose r...... be the starting point of a computational theory of reversible computing. We provide a novel semantics-based approach to such a theory, using reversible Turing machines (RTMs) as the underlying computation model. We show that the RTMs can compute exactly all injective, computable functions. We find that the RTMs...

  14. Computer face-matching technology using two-dimensional photographs accurately matches the facial gestalt of unrelated individuals with the same syndromic form of intellectual disability.

    Science.gov (United States)

    Dudding-Byth, Tracy; Baxter, Anne; Holliday, Elizabeth G; Hackett, Anna; O'Donnell, Sheridan; White, Susan M; Attia, John; Brunner, Han; de Vries, Bert; Koolen, David; Kleefstra, Tjitske; Ratwatte, Seshika; Riveros, Carlos; Brain, Steve; Lovell, Brian C

    2017-12-19

    Massively parallel genetic sequencing allows rapid testing of known intellectual disability (ID) genes. However, the discovery of novel syndromic ID genes requires molecular confirmation in at least a second or a cluster of individuals with an overlapping phenotype or similar facial gestalt. Using computer face-matching technology we report an automated approach to matching the faces of non-identical individuals with the same genetic syndrome within a database of 3681 images [1600 images of one of 10 genetic syndrome subgroups together with 2081 control images]. Using the leave-one-out method, two research questions were specified: 1) Using two-dimensional (2D) photographs of individuals with one of 10 genetic syndromes within a database of images, did the technology correctly identify more than expected by chance: i) a top match? ii) at least one match within the top five matches? or iii) at least one in the top 10 with an individual from the same syndrome subgroup? 2) Was there concordance between correct technology-based matches and whether two out of three clinical geneticists would have considered the diagnosis based on the image alone? The computer face-matching technology correctly identifies a top match, at least one correct match in the top five and at least one in the top 10 more than expected by chance (P technology and clinicians, with higher accuracy of the technology when results were discordant (P computer face-matching technology was tested on images of individuals with known syndromic forms of intellectual disability, the results of this pilot study illustrate the potential utility of face-matching technology within deep phenotyping platforms to facilitate the interpretation of DNA sequencing data for individuals who remain undiagnosed despite testing the known developmental disorder genes.

  15. Integer programming theory, applications, and computations

    CERN Document Server

    Taha, Hamdy A

    1975-01-01

    Integer Programming: Theory, Applications, and Computations provides information pertinent to the theory, applications, and computations of integer programming. This book presents the computational advantages of the various techniques of integer programming.Organized into eight chapters, this book begins with an overview of the general categorization of integer applications and explains the three fundamental techniques of integer programming. This text then explores the concept of implicit enumeration, which is general in a sense that it is applicable to any well-defined binary program. Other

  16. Mastering cloud computing foundations and applications programming

    CERN Document Server

    Buyya, Rajkumar; Selvi, SThamarai

    2013-01-01

    Mastering Cloud Computing is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won't live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the requirements of building apps for these virtual systems, including concurrent programming, high-performance computing, and data-intensive systems. The book introduces the principles of distributed and parallel computing underlying cloud architectures and specifical

  17. 77 FR 74020 - Office of Child Support Enforcement; Privacy Act of 1974; Computer Matching Agreement

    Science.gov (United States)

    2012-12-12

    ... for the administration of its tax compliance function. C. Authority for Conducting the Match The..., or continuing compliance with statutory and regulatory requirements by, applicants for, or recipients... writing that the program has been conducted in compliance with the agreement. BILLING CODE P ...

  18. 78 FR 15730 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... immigration status information contained within the DHS/USCIS Verification Information System (VIS). The... and Immigration Services, Department of Homeland Security. ] ACTION: Notice. Overview Information.... Citizenship and Immigration Services and the New York Department of Labor. SUPPLEMENTARY INFORMATION: The...

  19. 78 FR 15731 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... status information contained within the DHS-USCIS Verification Information System (VIS). The immigration... Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy.... Citizenship and Immigration Services and the Texas Workforce Commission. SUPPLEMENTARY INFORMATION: The...

  20. 78 FR 15732 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... Verification Information System (VIS). The immigration status information will enable CA-DHCS to determine... Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy.... SUPPLEMENTARY INFORMATION: The Department of Homeland Security/U.S. Citizenship and Immigration Services...

  1. 78 FR 15734 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... contained within the DHS/USCIS Verification Information System (VIS). The immigration status information... Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy... Assistance. SUPPLEMENTARY INFORMATION: The Department of Homeland Security/U.S. Citizenship and Immigration...

  2. 78 FR 38724 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-06-27

    ... access to immigration status information contained within the DHS/USCIS Verification Information System... Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy... California Department of Social Services. SUPPLEMENTARY INFORMATION: The Department of Homeland Security/U.S...

  3. 78 FR 15733 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... information contained within the DHS/USCIS Verification Information System (VIS). The immigration status... Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy... Workforce Development. SUPPLEMENTARY INFORMATION: The Department of Homeland Security/U.S. Citizenship and...

  4. 76 FR 24564 - Privacy Act of 1974: Computer Matching Program

    Science.gov (United States)

    2011-05-02

    ...' dependency and indemnity compensation provided under section 1315 of Title 38, United States Code; Name of... of records are: 1. Alabama Department of Human Resources. 2. Alabama Medicaid Agency. 3. Alaska... Human Services. 6. California Department of Social Services. 7. Colorado Department of Human Services. 8...

  5. 75 FR 17788 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2010-04-07

    ... Government Reform of the House of Representatives and the Office of Information and Regulatory Affairs...: James Sparrow on (202) 606-1803. SUPPLEMENTARY INFORMATION: A. General The Privacy Act (5 U.S.C. 552a...

  6. 75 FR 31819 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2010-06-04

    ... Government Reform of the House of Representatives and the Office of Information and Regulatory Affairs...: James Sparrow on (202) 606-1803. SUPPLEMENTARY INFORMATION: A. General The Privacy Act (5 U.S.C. 552a...

  7. 76 FR 50198 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2011-08-12

    ... General Data Analytics System (ODAS) (18- 10-02), which downloads data from the National Student Loan Data... using the article search feature at: http://www.federalregister.gov . Specifically, through the advanced...

  8. A Foundation for Flow-Based Program Matching Using Temporal Logic and Model Checking

    DEFF Research Database (Denmark)

    Brunel, Julien Pierre Manuel; Doligez, Damien; Hansen, Rene Rydhof

    2008-01-01

    different values within different control-flow paths, and a notion of witnesses that record such existential bindings for use in the subsequent program transformation process. We formalize CTL-VW and describe its use in the context of Coccinelle. We then assess the performance of the approach in practice......Reasoning about program control-flow paths is an important functionality of a number of recent program matching languages and associated searching and transformation tools. Temporal logic provides a well-defined means of expressing properties of control-flow paths in programs, and indeed......-VW (CTL with variables and witnesses) that is a suitable basis for the semantics and implementation of the Coccinelle’s program matching language. Our extension to CTL includes existential quantification over program fragments, which allows metavariables in the program matching language to range over...

  9. On Verified Numerical Computations in Convex Programming

    OpenAIRE

    Jansson, Christian

    2009-01-01

    This survey contains recent developments for computing verified results of convex constrained optimization problems, with emphasis on applications. Especially, we consider the computation of verified error bounds for non-smooth convex conic optimization in the framework of functional analysis, for linear programming, and for semidefinite programming. A discussion of important problem transformations to special types of convex problems and convex relaxations is included...

  10. Computational Approaches to Facilitate Epitope-Based HLA Matching in Solid Organ Transplantation

    Directory of Open Access Journals (Sweden)

    Kirsten Geneugelijk

    2017-01-01

    Full Text Available Epitope-based HLA matching has been emerged over the last few years as an improved method for HLA matching in solid organ transplantation. The epitope-based matching concept has been incorporated in both the PIRCHE-II and the HLAMatchmaker algorithm to find the most suitable donor for a recipient. For these algorithms, high-resolution HLA genotype data of both donor and recipient is required. Since high-resolution HLA genotype data is often not available, we developed a computational method which allows epitope-based HLA matching from serological split level HLA typing relying on HLA haplotype frequencies. To validate this method, we simulated a donor-recipient population for which PIRCHE-II and eplet values were calculated when using both high-resolution HLA genotype data and serological split level HLA typing. The majority of the serological split level HLA-determined ln(PIRCHE-II/ln(eplet values did not or only slightly deviate from the reference group of high-resolution HLA-determined ln(PIRCHE-II/ln(eplet values. This deviation was slightly increased when HLA-C or HLA-DQ was omitted from the input and was substantially decreased when using two-field resolution HLA genotype data of the recipient and serological split level HLA typing of the donor. Thus, our data suggest that our computational approach is a powerful tool to estimate PIRCHE-II/eplet values when high-resolution HLA genotype data is not available.

  11. Structured Parallel Programming Patterns for Efficient Computation

    CERN Document Server

    McCool, Michael; Robison, Arch

    2012-01-01

    Programming is now parallel programming. Much as structured programming revolutionized traditional serial programming decades ago, a new kind of structured programming, based on patterns, is relevant to parallel programming today. Parallel computing experts and industry insiders Michael McCool, Arch Robison, and James Reinders describe how to design and implement maintainable and efficient parallel algorithms using a pattern-based approach. They present both theory and practice, and give detailed concrete examples using multiple programming models. Examples are primarily given using two of th

  12. A Computer-Based Program to Teach Braille Reading to Sighted Individuals

    Science.gov (United States)

    Scheithauer, Mindy C.; Tiger, Jeffrey H.

    2012-01-01

    Instructors of the visually impaired need efficient braille-training methods. This study conducted a preliminary evaluation of a computer-based program intended to teach the relation between braille characters and English letters using a matching-to-sample format with 4 sighted college students. Each participant mastered matching visual depictions…

  13. Matching theory

    CERN Document Server

    Plummer, MD

    1986-01-01

    This study of matching theory deals with bipartite matching, network flows, and presents fundamental results for the non-bipartite case. It goes on to study elementary bipartite graphs and elementary graphs in general. Further discussed are 2-matchings, general matching problems as linear programs, the Edmonds Matching Algorithm (and other algorithmic approaches), f-factors and vertex packing.

  14. Object matching using a locally affine invariant and linear programming techniques.

    Science.gov (United States)

    Li, Hongsheng; Huang, Xiaolei; He, Lei

    2013-02-01

    In this paper, we introduce a new matching method based on a novel locally affine-invariant geometric constraint and linear programming techniques. To model and solve the matching problem in a linear programming formulation, all geometric constraints should be able to be exactly or approximately reformulated into a linear form. This is a major difficulty for this kind of matching algorithm. We propose a novel locally affine-invariant constraint which can be exactly linearized and requires a lot fewer auxiliary variables than other linear programming-based methods do. The key idea behind it is that each point in the template point set can be exactly represented by an affine combination of its neighboring points, whose weights can be solved easily by least squares. Errors of reconstructing each matched point using such weights are used to penalize the disagreement of geometric relationships between the template points and the matched points. The resulting overall objective function can be solved efficiently by linear programming techniques. Our experimental results on both rigid and nonrigid object matching show the effectiveness of the proposed algorithm.

  15. Computer Programs in Marine Science

    Science.gov (United States)

    1976-04-01

    between two locations. Requires subroutines COS, SIN, ARCOS . Author - Ralph Johnson. Oceanographic Services Branch Copy on file at XODC National...STEREOGRAPHIC PROJECTICN 65 FORTRAN CDC 3800 PIE SCATTERINC COMPUTATIONS 41 FURTRAN COC 36UO PLCTS TRACK $AD DATA PROFILE .RACK 47 FORTRAN COC 3.00 PLCTS

  16. FORTRAN computer program for seismic risk analysis

    Science.gov (United States)

    McGuire, Robin K.

    1976-01-01

    A program for seismic risk analysis is described which combines generality of application, efficiency and accuracy of operation, and the advantage of small storage requirements. The theoretical basis for the program is first reviewed, and the computational algorithms used to apply this theory are described. The information required for running the program is listed. Published attenuation functions describing the variation with earthquake magnitude and distance of expected values for various ground motion parameters are summarized for reference by the program user. Finally, suggestions for use of the program are made, an example problem is described (along with example problem input and output) and the program is listed.

  17. Computer programming and architecture the VAX

    CERN Document Server

    Levy, Henry

    2014-01-01

    Takes a unique systems approach to programming and architecture of the VAXUsing the VAX as a detailed example, the first half of this book offers a complete course in assembly language programming. The second describes higher-level systems issues in computer architecture. Highlights include the VAX assembler and debugger, other modern architectures such as RISCs, multiprocessing and parallel computing, microprogramming, caches and translation buffers, and an appendix on the Berkeley UNIX assembler.

  18. Evaluation of Content-Matched Range Monitoring Queries over Moving Objects in Mobile Computing Environments.

    Science.gov (United States)

    Jung, HaRim; Song, MoonBae; Youn, Hee Yong; Kim, Ung Mo

    2015-09-18

    A content-matched (CM) rangemonitoring query overmoving objects continually retrieves the moving objects (i) whose non-spatial attribute values are matched to given non-spatial query values; and (ii) that are currently located within a given spatial query range. In this paper, we propose a new query indexing structure, called the group-aware query region tree (GQR-tree) for efficient evaluation of CMrange monitoring queries. The primary role of the GQR-tree is to help the server leverage the computational capabilities of moving objects in order to improve the system performance in terms of the wireless communication cost and server workload. Through a series of comprehensive simulations, we verify the superiority of the GQR-tree method over the existing methods.

  19. Evaluation of Content-Matched Range Monitoring Queries over Moving Objects in Mobile Computing Environments

    Directory of Open Access Journals (Sweden)

    HaRim Jung

    2015-09-01

    Full Text Available A content-matched (CM rangemonitoring query overmoving objects continually retrieves the moving objects (i whose non-spatial attribute values are matched to given non-spatial query values; and (ii that are currently located within a given spatial query range. In this paper, we propose a new query indexing structure, called the group-aware query region tree (GQR-tree for efficient evaluation of CMrange monitoring queries. The primary role of the GQR-tree is to help the server leverage the computational capabilities of moving objects in order to improve the system performance in terms of the wireless communication cost and server workload. Through a series of comprehensive simulations, we verify the superiority of the GQR-tree method over the existing methods.

  20. Evaluation of Content-Matched Range Monitoring Queries over Moving Objects in Mobile Computing Environments

    Science.gov (United States)

    Jung, HaRim; Song, MoonBae; Youn, Hee Yong; Kim, Ung Mo

    2015-01-01

    A content-matched (CM) range monitoring query over moving objects continually retrieves the moving objects (i) whose non-spatial attribute values are matched to given non-spatial query values; and (ii) that are currently located within a given spatial query range. In this paper, we propose a new query indexing structure, called the group-aware query region tree (GQR-tree) for efficient evaluation of CM range monitoring queries. The primary role of the GQR-tree is to help the server leverage the computational capabilities of moving objects in order to improve the system performance in terms of the wireless communication cost and server workload. Through a series of comprehensive simulations, we verify the superiority of the GQR-tree method over the existing methods. PMID:26393613

  1. The Dynamic Geometrisation of Computer Programming

    Science.gov (United States)

    Sinclair, Nathalie; Patterson, Margaret

    2018-01-01

    The goal of this paper is to explore dynamic geometry environments (DGE) as a type of computer programming language. Using projects created by secondary students in one particular DGE, we analyse the extent to which the various aspects of computational thinking--including both ways of doing things and particular concepts--were evident in their…

  2. 43 Computer Assisted Programmed Instruction and Cognitive ...

    African Journals Online (AJOL)

    cce

    Computer Assisted Programmed Instruction and Cognitive Preference Style as. Determinant of Achievement of Secondary School Physics Students. Sotayo, M. A. O.. Federal College of Education, Osiele, Abeokuta, Nigeria. Abstract. The study probes into the effect of Computer Assisted Instruction and Cognitive preference.

  3. NASA High-End Computing Program Website

    Science.gov (United States)

    Cohen, Jarrett S.

    2008-01-01

    If you are a NASA-sponsored scientist or engineer. computing time is available to you at the High-End Computing (HEC) Program's NASA Advanced Supercomputing (NAS) Facility and NASA Center for Computational Sciences (NCCS). The Science Mission Directorate will select from requests NCCS Portals submitted to the e-Books online system for awards beginning on May 1. Current projects set to explore on April 30 must have a request in e-Books to be considered for renewal

  4. Efficient and Correct Stencil Computation via Pattern Matching and Static Typing

    Directory of Open Access Journals (Sweden)

    Dominic Orchard

    2011-09-01

    Full Text Available Stencil computations, involving operations over the elements of an array, are a common programming pattern in scientific computing, games, and image processing. As a programming pattern, stencil computations are highly regular and amenable to optimisation and parallelisation. However, general-purpose languages obscure this regular pattern from the compiler, and even the programmer, preventing optimisation and obfuscating (incorrectness. This paper furthers our work on the Ypnos domain-specific language for stencil computations embedded in Haskell. Ypnos allows declarative, abstract specification of stencil computations, exposing the structure of a problem to the compiler and to the programmer via specialised syntax. In this paper we show the decidable safety guarantee that well-formed, well-typed Ypnos programs cannot index outside of array boundaries. Thus indexing in Ypnos is safe and run-time bounds checking can be eliminated. Program information is encoded as types, using the advanced type-system features of the Glasgow Haskell Compiler, with the safe-indexing invariant enforced at compile time via type checking.

  5. Computer-Aided Corrosion Program Management

    Science.gov (United States)

    MacDowell, Louis

    2010-01-01

    This viewgraph presentation reviews Computer-Aided Corrosion Program Management at John F. Kennedy Space Center. The contents include: 1) Corrosion at the Kennedy Space Center (KSC); 2) Requirements and Objectives; 3) Program Description, Background and History; 4) Approach and Implementation; 5) Challenges; 6) Lessons Learned; 7) Successes and Benefits; and 8) Summary and Conclusions.

  6. Integrity of the National Resident Matching Program for Radiation Oncology: National Survey of Applicant Experiences

    Energy Technology Data Exchange (ETDEWEB)

    Holliday, Emma B. [Division of Radiation Oncology, The University of Texas MD Anderson Cancer Center, Houston, Texas (United States); Thomas, Charles R., E-mail: thomasch@ohsu.edu [Department of Radiation Medicine, OHSU Knight Cancer Institute, Oregon Health and Science University, Portland, Oregon (United States); Kusano, Aaron S. [Department of Radiation Oncology, University of Washington Medical Center, Seattle, Washington (United States)

    2015-07-01

    Purpose: The aim of this study was to examine the experiences of radiation oncology applicants and to evaluate the prevalence of behaviors that may be in conflict with established ethical standards. Methods and Materials: An anonymous survey was sent to all 2013 applicants to a single domestic radiation oncology residency program through the National Resident Matching Program (NRMP). Questions included demographics, survey of observed behaviors, and opinions regarding the interview and matching process. Descriptive statistics were presented. Characteristics and experiences of respondents who matched were compared with those who did not match. Results: Questionnaires were returned by 87 of 171 applicants for a 51% response rate. Eighty-two questionnaires were complete and included for analysis. Seventy-eight respondents (95.1%) reported being asked at least 1 question in conflict with the NRMP code of conduct. When asked where else they were interviewing, 64% stated that this query made them uncomfortable. Forty-five respondents (54.9%) reported unsolicited post-interview contact by programs, and 31 (37.8%) felt pressured to give assurances. Fifteen respondents (18.3%) reported being told their rank position or that they were “ranked to match” prior to Match day, with 27% of those individuals indicating this information influenced how they ranked programs. Half of respondents felt applicants often made dishonest or misleading assurances, one-third reported that they believed their desired match outcome could be improved by deliberately misleading programs, and more than two-thirds felt their rank position could be improved by having faculty from their home institutions directly contact programs on their behalf. Conclusions: Radiation oncology applicants report a high prevalence of behaviors in conflict with written NRMP policies. Post-interview communication should be discouraged in order to enhance fairness and support the professional development of future

  7. Developing computer training programs for blood bankers.

    Science.gov (United States)

    Eisenbrey, L

    1992-01-01

    Two surveys were conducted in July 1991 to gather information about computer training currently performed within American Red Cross Blood Services Regions. One survey was completed by computer trainers from software developer-vendors and regional centers. The second survey was directed to the trainees, to determine their perception of the computer training. The surveys identified the major concepts, length of training, evaluations, and methods of instruction used. Strengths and weaknesses of training programs were highlighted by trainee respondents. Using the survey information and other sources, recommendations (including those concerning which computer skills and tasks should be covered) are made that can be used as guidelines for developing comprehensive computer training programs at any blood bank or blood center.

  8. In vitro and in vivo evaluations of three computer-aided shade matching instruments.

    Science.gov (United States)

    Yuan, Kun; Sun, Xiang; Wang, Fu; Wang, Hui; Chen, Ji-hua

    2012-01-01

    This study evaluated the accuracy and reliability of three computer-aided shade matching instruments (Shadepilot, VITA Easyshade, and ShadeEye NCC) using both in vitro and in vivo models. The in vitro model included the measurement of five VITA Classical shade guides. The in vivo model utilized three instruments to measure the central region of the labial surface of maxillary right central incisors of 85 people. The accuracy and reliability of the three instruments in these two evaluating models were calculated. Significant differences were observed in the accuracy of instruments both in vitro and in vivo. No significant differences were found in the reliability of instruments between and within the in vitro and the in vivo groups. VITA Easyshade was significantly different in accuracy between in vitro and in vivo models, while no significant difference was found for the other two instruments. Shadepilot was the only instrument tested in the present study that showed high accuracy and reliability both in vitro and in vivo. Significant differences were observed in the L*a*b* values of the 85 natural teeth measured using three instruments in the in vivo assessment. The pair-agreement rates of shade matching among the three instruments ranged from 37.7% to 48.2%, and the incidence of identical shade results shared by all three instruments was 25.9%. As different L*a*b* values and shade matching results were reported for the same tooth, a combination of the evaluated shade matching instruments and visual shade confirmation is recommended for clinical use.

  9. Predictive equations for lung volumes from computed tomography for size matching in pulmonary transplantation.

    Science.gov (United States)

    Konheim, Jeremy A; Kon, Zachary N; Pasrija, Chetan; Luo, Qingyang; Sanchez, Pablo G; Garcia, Jose P; Griffith, Bartley P; Jeudy, Jean

    2016-04-01

    Size matching for lung transplantation is widely accomplished using height comparisons between donors and recipients. This gross approximation allows for wide variation in lung size and, potentially, size mismatch. Three-dimensional computed tomography (3D-CT) volumetry comparisons could offer more accurate size matching. Although recipient CT scans are universally available, donor CT scans are rarely performed. Therefore, predicted donor lung volumes could be used for comparison to measured recipient lung volumes, but no such predictive equations exist. We aimed to use 3D-CT volumetry measurements from a normal patient population to generate equations for predicted total lung volume (pTLV), predicted right lung volume (pRLV), and predicted left lung volume (pLLV), for size-matching purposes. Chest CT scans of 400 normal patients were retrospectively evaluated. 3D-CT volumetry was performed to measure total lung volume, right lung volume, and left lung volume of each patient, and predictive equations were generated. The fitted model was tested in a separate group of 100 patients. The model was externally validated by comparison of total lung volume with total lung capacity from pulmonary function tests in a subset of those patients. Age, gender, height, and race were independent predictors of lung volume. In the test group, there were strong linear correlations between predicted and actual lung volumes measured by 3D-CT volumetry for pTLV (r = 0.72), pRLV (r = 0.72), and pLLV (r = 0.69). A strong linear correlation was also observed when comparing pTLV and total lung capacity (r = 0.82). We successfully created a predictive model for pTLV, pRLV, and pLLV. These may serve as reference standards and predict donor lung volume for size matching in lung transplantation. Copyright © 2016 The American Association for Thoracic Surgery. Published by Elsevier Inc. All rights reserved.

  10. The Computational Physics Program of the national MFE Computer Center

    Energy Technology Data Exchange (ETDEWEB)

    Mirin, A.A.

    1989-01-01

    Since June 1974, the MFE Computer Center has been engaged in a significant computational physics effort. The principal objective of the Computational Physics Group is to develop advanced numerical models for the investigation of plasma phenomena and the simulation of present and future magnetic confinement devices. Another major objective of the group is to develop efficient algorithms and programming techniques for current and future generations of supercomputers. The Computational Physics Group has been involved in several areas of fusion research. One main area is the application of Fokker-Planck/quasilinear codes to tokamaks. Another major area is the investigation of resistive magnetohydrodynamics in three dimensions, with applications to tokamaks and compact toroids. A third area is the investigation of kinetic instabilities using a 3-D particle code; this work is often coupled with the task of numerically generating equilibria which model experimental devices. Ways to apply statistical closure approximations to study tokamak-edge plasma turbulence have been under examination, with the hope of being able to explain anomalous transport. Also, we are collaborating in an international effort to evaluate fully three-dimensional linear stability of toroidal devices. In addition to these computational physics studies, the group has developed a number of linear systems solvers for general classes of physics problems and has been making a major effort at ascertaining how to efficiently utilize multiprocessor computers. A summary of these programs are included in this paper. 6 tabs.

  11. An introduction to Python and computer programming

    CERN Document Server

    Zhang, Yue

    2015-01-01

    This book introduces Python programming language and fundamental concepts in algorithms and computing. Its target audience includes students and engineers with little or no background in programming, who need to master a practical programming language and learn the basic thinking in computer science/programming. The main contents come from lecture notes for engineering students from all disciplines, and has received high ratings. Its materials and ordering have been adjusted repeatedly according to classroom reception. Compared to alternative textbooks in the market, this book introduces the underlying Python implementation of number, string, list, tuple, dict, function, class, instance and module objects in a consistent and easy-to-understand way, making assignment, function definition, function call, mutability and binding environments understandable inside-out. By giving the abstraction of implementation mechanisms, this book builds a solid understanding of the Python programming language.

  12. MATCH package for the ANL three-view geometry program. [For matching particle tracks from various views to obtain proper input for TVGP

    Energy Technology Data Exchange (ETDEWEB)

    Gieraltowski, G.F.

    1976-02-01

    The ANL MATCH package consists of a set of 13 subroutines which are linked to the current 12-foot and 15-foot versions of the ANL TVGP program. Their purpose is to match the tracks from the various measured views to obtain a proper matched set of tracks to be processed by TVGP. The MATCH package can effectively handle up to 20 tracks per event measured in 2 or 3 views and, in cases of ambiguous match solutions, allow up to 10 match ambiguities. A basic assumption made is that the same number of tracks is measured in each view. MATCH can work in either two or three measured views with the assumption that, if only two views are measured, the last point measured on each track is a good representation of the true end-point of the track. This is not to say that, if this assumption is false, that MATCH cannot obtain a match solution. It is true, however, that the probability of obtaining a match solution is inversely proportional both to the number of tracks per vertex and to the momentum of the tracks. Current uses of MATCH are in obtaining match solutions for two-view K/sup -/p (6.5 GeV/c) events measured on POLLY III and in obtaining match solutions for events with large numbers of tracks (3 to 10) produced by an anti ..nu.. p interaction in the FNAL 15-foot bubble chamber with a spectrum of momentum values ranging from 5 to 25 Gev/c. (RWR)

  13. E-MEM: efficient computation of maximal exact matches for very large genomes.

    Science.gov (United States)

    Khiste, Nilesh; Ilie, Lucian

    2015-02-15

    Alignment of similar whole genomes is often performed using anchors given by the maximal exact matches (MEMs) between their sequences. In spite of significant amount of research on this problem, the computation of MEMs for large genomes remains a challenging problem. The leading current algorithms employ full text indexes, the sparse suffix array giving the best results. Still, their memory requirements are high, the parallelization is not very efficient, and they cannot handle very large genomes. We present a new algorithm, efficient computation of MEMs (E-MEM) that does not use full text indexes. Our algorithm uses much less space and is highly amenable to parallelization. It can compute all MEMs of minimum length 100 between the whole human and mouse genomes on a 12 core machine in 10 min and 2 GB of memory; the required memory can be as low as 600 MB. It can run efficiently genomes of any size. Extensive testing and comparison with currently best algorithms is provided. The source code of E-MEM is freely available at: http://www.csd.uwo.ca/∼ilie/E-MEM/ CONTACT: ilie@csd.uwo.ca Supplementary data are available at Bioinformatics online. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  14. Role of logic programming in computer studies

    Directory of Open Access Journals (Sweden)

    Nicolae PELIN

    2016-09-01

    Full Text Available The paper contains the analysis of the opinions of a number of scholars and specialists on the importance and the role in logic programming methodology of studying computer science, philosophy about the logic programs and interpreter, concerning the burden of which is opposite to the programmer if there is logic interpreter. The presented material is meant, according to the author, to help the reader to understand more easily the analyzed multilateral problem.

  15. Program computes turbine steam rates and properties

    Energy Technology Data Exchange (ETDEWEB)

    Ganapathy, V. (ABCO Industries, Inc., Abilene, TX (US))

    1988-11-01

    BASIC computer program quickly evaluates steam properties and rates during expansion in a steam turbine. Engineers involved in cogeneration projects and power plant studies often need to calculate the steam properties during expansion in a steam turbine to evaluate the theoretical and actual steam rates and hence, the electrical power output. With the help of this program written in BASIC, one can quickly evaluate all the pertinent data. Correlations used for steam property evaluation are also presented.

  16. Hardware Architectures for Data-Intensive Computing Problems: A Case Study for String Matching

    Energy Technology Data Exchange (ETDEWEB)

    Tumeo, Antonino; Villa, Oreste; Chavarría-Miranda, Daniel

    2012-12-28

    DNA analysis is an emerging application of high performance bioinformatic. Modern sequencing machinery are able to provide, in few hours, large input streams of data, which needs to be matched against exponentially growing databases of known fragments. The ability to recognize these patterns effectively and fastly may allow extending the scale and the reach of the investigations performed by biology scientists. Aho-Corasick is an exact, multiple pattern matching algorithm often at the base of this application. High performance systems are a promising platform to accelerate this algorithm, which is computationally intensive but also inherently parallel. Nowadays, high performance systems also include heterogeneous processing elements, such as Graphic Processing Units (GPUs), to further accelerate parallel algorithms. Unfortunately, the Aho-Corasick algorithm exhibits large performance variability, depending on the size of the input streams, on the number of patterns to search and on the number of matches, and poses significant challenges on current high performance software and hardware implementations. An adequate mapping of the algorithm on the target architecture, coping with the limit of the underlining hardware, is required to reach the desired high throughputs. In this paper, we discuss the implementation of the Aho-Corasick algorithm for GPU-accelerated high performance systems. We present an optimized implementation of Aho-Corasick for GPUs and discuss its tradeoffs on the Tesla T10 and he new Tesla T20 (codename Fermi) GPUs. We then integrate the optimized GPU code, respectively, in a MPI-based and in a pthreads-based load balancer to enable execution of the algorithm on clusters and large sharedmemory multiprocessors (SMPs) accelerated with multiple GPUs.

  17. Micro-seismic waveform matching inversion based on gravitational search algorithm and parallel computation

    Science.gov (United States)

    Jiang, Y.; Xing, H. L.

    2016-12-01

    Micro-seismic events induced by water injection, mining activity or oil/gas extraction are quite informative, the interpretation of which can be applied for the reconstruction of underground stress and monitoring of hydraulic fracturing progress in oil/gas reservoirs. The source characterises and locations are crucial parameters that required for these purposes, which can be obtained through the waveform matching inversion (WMI) method. Therefore it is imperative to develop a WMI algorithm with high accuracy and convergence speed. Heuristic algorithm, as a category of nonlinear method, possesses a very high convergence speed and good capacity to overcome local minimal values, and has been well applied for many areas (e.g. image processing, artificial intelligence). However, its effectiveness for micro-seismic WMI is still poorly investigated; very few literatures exits that addressing this subject. In this research an advanced heuristic algorithm, gravitational search algorithm (GSA) , is proposed to estimate the focal mechanism (angle of strike, dip and rake) and source locations in three dimension. Unlike traditional inversion methods, the heuristic algorithm inversion does not require the approximation of green function. The method directly interacts with a CPU parallelized finite difference forward modelling engine, and updating the model parameters under GSA criterions. The effectiveness of this method is tested with synthetic data form a multi-layered elastic model; the results indicate GSA can be well applied on WMI and has its unique advantages. Keywords: Micro-seismicity, Waveform matching inversion, gravitational search algorithm, parallel computation

  18. Young children reorient by computing layout geometry, not by matching images of the environment.

    Science.gov (United States)

    Lee, Sang Ah; Spelke, Elizabeth S

    2011-02-01

    Disoriented animals from ants to humans reorient in accord with the shape of the surrounding surface layout: a behavioral pattern long taken as evidence for sensitivity to layout geometry. Recent computational models suggest, however, that the reorientation process may not depend on geometrical analyses but instead on the matching of brightness contours in 2D images of the environment. Here we test this suggestion by investigating young children's reorientation in enclosed environments. Children reoriented by extremely subtle geometric properties of the 3D layout: bumps and ridges that protruded only slightly off the floor, producing edges with low contrast. Moreover, children failed to reorient by prominent brightness contours in continuous layouts with no distinctive 3D structure. The findings provide evidence that geometric layout representations support children's reorientation.

  19. A CAD (Classroom Assessment Design) of a Computer Programming Course

    Science.gov (United States)

    Hawi, Nazir S.

    2012-01-01

    This paper presents a CAD (classroom assessment design) of an entry-level undergraduate computer programming course "Computer Programming I". CAD has been the product of a long experience in teaching computer programming courses including teaching "Computer Programming I" 22 times. Each semester, CAD is evaluated and modified…

  20. Developing a custom dental porcelain shade system for computer color matching.

    Science.gov (United States)

    Ishikawa-Nagai, Shigemi; Wang, Jian; Seliger, Alison; Lin, Jin; Da Silva, John

    2013-08-01

    This study aims to update the computer color matching method by generating a new ceramic shade system that covers the entire spectrum of natural tooth color and has an efficient design. First, the color map of 176 maxillary natural incisors and two commercially available and commonly used shade guide systems (Vitapan classic and 3D master) were drawn. Then, 15 shades of layered disks (NW-0: neutral white-0, A1, A2, A3, A4, B1, B4, C4, and D4, and six modifiers; white, pink, grey, blue, cervical-1 and cervical-2, Cerabien ZR) were plotted on the tooth color distribution map. Ultimately, 12 target shades were selected around the perimeter of the natural tooth color space, and nine different shades were selected within the cluster. By trial and error informed by known formulations published previously, the formulations of Cerabien ZR porcelain powders necessary to achieve these 21 target shades in thickness of 1.0mm layered on zirconia substrate were then determined and ceramic disks were fabricated. Color distribution L*-C* and a*-b* maps showed that new 21 shade system covers a slightly broader range than the natural tooth distribution, and its distribution is larger than the 3D Master shade's range. In the present study, a 21 custom dental porcelain shade system was developed with a 1.0mm porcelain thickness overlying a zirconia substrate, which can be incorporated into the computer color matching system. This new shade system has homogeneity with 3D Master, and has a slightly wider color distribution than that of natural teeth. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Introduction to programming multiple-processor computers

    Energy Technology Data Exchange (ETDEWEB)

    Hicks, H.R.; Lynch, V.E.

    1985-04-01

    FORTRAN applications programs can be executed on multiprocessor computers in either a unitasking (traditional) or multitasking form. The latter allows a single job to use more than one processor simultaneously, with a consequent reduction in wall-clock time and, perhaps, the cost of the calculation. An introduction to programming in this environment is presented. The concepts of synchronization and data sharing using EVENTS and LOCKS are illustrated with examples. The strategy of strong synchronization and the use of synchronization templates are proposed. We emphasize that incorrect multitasking programs can produce irreproducible results, which makes debugging more difficult.

  2. Computer Assisted Programmed Instruction and Cognitive ...

    African Journals Online (AJOL)

    The achievement of students of application learning mode was also significantly higher than those of recall and principle respectively. There was no significant interaction effect between Cognitive Preference Style and Computer Assisted Programmed Instruction. The implications of the result to the stakeholder were ...

  3. Computer program package for PIXE spectra evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Kajfosz, J. [Institute of Nuclear Physics, Cracow (Poland)

    1992-12-31

    The computer programs described here were developed for calculating the concentrations of elements in samples analysed by the PIXE (Proton Induced X-ray Emission) method from the X-ray spectra obtained in those analyses. (author). 10 refs, 2 figs.

  4. Computer programming students head to Tokyo

    OpenAIRE

    Crumbley, Liz

    2007-01-01

    "The Milk's Gone Bad," a team of three undergraduate students from the Virginia Tech College of Engineering, will compete in the World Finals of the Association of Computing Machinery International Collegiate Programming Contest (ACM-ICPC) March 12-16 in Tokyo, Japan.

  5. Computer Program Re-layers Engineering Drawings

    Science.gov (United States)

    Crosby, Dewey C., III

    1990-01-01

    RULCHK computer program aids in structuring layers of information pertaining to part or assembly designed with software described in article "Software for Drawing Design Details Concurrently" (MFS-28444). Checks and optionally updates structure of layers for part. Enables designer to construct model and annotate its documentation without burden of manually layering part to conform to standards at design time.

  6. Data systems and computer science programs: Overview

    Science.gov (United States)

    Smith, Paul H.; Hunter, Paul

    1991-01-01

    An external review of the Integrated Technology Plan for the Civil Space Program is presented. The topics are presented in viewgraph form and include the following: onboard memory and storage technology; advanced flight computers; special purpose flight processors; onboard networking and testbeds; information archive, access, and retrieval; visualization; neural networks; software engineering; and flight control and operations.

  7. A Comparison of Matched and Unmatched Orthopaedic Surgery Residency Applicants from 2006 to 2014: Data from the National Resident Matching Program.

    Science.gov (United States)

    Schrock, John B; Kraeutler, Matthew J; Dayton, Michael R; McCarty, Eric C

    2017-01-04

    The Association of American Medical Colleges publishes residency match data and reports through the National Resident Matching Program (NRMP) every year. The purpose of this study was to analyze trends in orthopaedic surgery residency matching data and characteristics of successful applicants to counsel medical students with regard to their chances of matching. The annual reports of the NRMP were searched annually from 2006 to 2014 to determine the number of orthopaedic surgery residency positions available, the number of applicants, and the match rate among applicants. Comparisons were performed between matched applicants and unmatched applicants with regard to the number of contiguous ranks and distinct specialties, United States Medical Licensing Examination (USMLE) scores, number of research experiences and research products (abstracts, presentations, posters, publications), and proportion of Alpha Omega Alpha (AOA) Honor Medical Society members and students at a top-40, National Institutes of Health (NIH)-funded medical school. The number of orthopaedic surgery positions available and number of applicants increased at a mean rate of 9 positions and 65 applicants per year (p = 0.11). The mean number of contiguous ranks for U.S. senior medical students was 11.5 for those who matched and 5.5 for those who did not match (p students at a top-40, NIH-funded medical school (both p experiences and research products, and contiguous ranks. A higher proportion of successful applicants are AOA members and students at a top-40, NIH-funded medical school.

  8. A Technology Based Program That Matches Enrichment Resources With Student Strengths

    Directory of Open Access Journals (Sweden)

    J.S. Renzulli

    2007-09-01

    Full Text Available Remarkable advances in instructionalcommunication technology (ICT have now made ispossible to provide high levels of enrichment and thekinds of curricular differentiation that facilitateadvanced learning services to students who have accessto a computer and the Internet. But in order tomaximize the potential if ICT it is necessary to constructprograms that are based on learning theory that goesbeyond the didactic and prescriptive models that haveresulted in too much worksheets-on-line and electronicencyclopedias. The Renzulli Learning System (RLSuses a strength-based learning theory called theEnrichment Triad Model that is purposefully designedto promote advanced level learning, creativeproductivity, and high levels of student engagement byfocusing on the application of knowledge rather than themere acquisition and storage of information.The Renzulli Learning System is acomprehensive program that begins by providing acomputer-generated profile of each student’s academicstrengths, interests, learning styles, and preferred modesof expression. A search engine then matches Internetresources to the student’s profile from fourteen carefullyscreened data bases that are categorized by subject area,grade level, state curricular standards, and degree ofcomplexity. There are also hundreds of enrichmentactivities that can be down loaded and reproduced forindividual or group learning activities. A managementsystem called the Wizard Project Maker guides studentsin the application of knowledge to teacher or studentselected assignments, independent research studies, orcreative projects that individuals or small groups wouldlike to pursue. Students and teachers can evaluate thequality of students’ products using a rubric called TheStudent Product Assessment Form. Students can rateeach site visited, conduct a self-assessment of what theyhave gained from the site, and place resources in theirown Total talent Portfolio for future use. RLS alsoincludes a

  9. Employing subgoals in computer programming education

    Science.gov (United States)

    Margulieux, Lauren E.; Catrambone, Richard; Guzdial, Mark

    2016-01-01

    The rapid integration of technology into our professional and personal lives has left many education systems ill-equipped to deal with the influx of people seeking computing education. To improve computing education, we are applying techniques that have been developed for other procedural fields. The present study applied such a technique, subgoal labeled worked examples, to explore whether it would improve programming instruction. The first two experiments, conducted in a laboratory, suggest that the intervention improves undergraduate learners' problem-solving performance and affects how learners approach problem-solving. The third experiment demonstrates that the intervention has similar, and perhaps stronger, effects in an online learning environment with in-service K-12 teachers who want to become qualified to teach computing courses. By implementing this subgoal intervention as a tool for educators to teach themselves and their students, education systems could improve computing education and better prepare learners for an increasingly technical world.

  10. Computer Presentation Programs and Teaching Research Methodologies

    Directory of Open Access Journals (Sweden)

    Vahid Motamedi

    2015-05-01

    Full Text Available Supplementing traditional chalk and board instruction with computer delivery has been viewed positively by students who have reported increased understanding and more interaction with the instructor when computer presentations are used in the classroom. Some problems contributing to student errors while taking class notes might be transcription of numbers to the board, and handwriting of the instructor can be resolved in careful construction of computer presentations. The use of computer presentation programs promises to increase the effectiveness of learning by making content more readily available, by reducing the cost and effort of producing quality content, and by allowing content to be more easily shared. This paper describes how problems can be overcome by using presentation packages for instruction.

  11. The application of computer color matching techniques to the matching of target colors in a food substrate: a first step in the development of foods with customized appearance.

    Science.gov (United States)

    Kim, Sandra; Golding, Matt; Archer, Richard H

    2012-06-01

    A predictive color matching model based on the colorimetric technique was developed and used to calculate the concentrations of primary food dyes needed in a model food substrate to match a set of standard tile colors. This research is the first stage in the development of novel three-dimensional (3D) foods in which color images or designs can be rapidly reproduced in 3D form. Absorption coefficients were derived for each dye, from a concentration series in the model substrate, a microwave-baked cake. When used in a linear, additive blending model these coefficients were able to predict cake color from selected dye blends to within 3 ΔE*(ab,10) color difference units, or within the limit of a visually acceptable match. Absorption coefficients were converted to pseudo X₁₀, Y₁₀, and Z₁₀ tri-stimulus values (X₁₀(P), Y₁₀(P), Z₁₀(P)) for colorimetric matching. The Allen algorithm was used to calculate dye concentrations to match the X₁₀(P), Y₁₀(P), and Z₁₀(P) values of each tile color. Several recipes for each color were computed with the tile specular component included or excluded, and tested in the cake. Some tile colors proved out-of-gamut, limited by legal dye concentrations; these were scaled to within legal range. Actual differences suggest reasonable visual matches could be achieved for within-gamut tile colors. The Allen algorithm, with appropriate adjustments of concentration outputs, could provide a sufficiently rapid and accurate calculation tool for 3D color food printing. The predictive color matching approach shows potential for use in a novel embodiment of 3D food printing in which a color image or design could be rendered within a food matrix through the selective blending of primary dyes to reproduce each color element. The on-demand nature of this food application requires rapid color outputs which could be provided by the color matching technique, currently used in nonfood industries, rather than by empirical food

  12. Foresters' Metric Conversions program (version 1.0). [Computer program

    Science.gov (United States)

    Jefferson A. Palmer

    1999-01-01

    The conversion of scientific measurements has become commonplace in the fields of - engineering, research, and forestry. Foresters? Metric Conversions is a Windows-based computer program that quickly converts user-defined measurements from English to metric and from metric to English. Foresters? Metric Conversions was derived from the publication "Metric...

  13. The automated computation of tree-level and next-to-leading order differential cross sections, and their matching to parton shower simulations

    CERN Document Server

    Alwall, J; Frixione, S; Hirschi, V; Maltoni, F; Mattelaer, O; Shao, H -S; Stelzer, T; Torrielli, P; Zaro, M

    2014-01-01

    We discuss the theoretical bases that underpin the automation of the computations of tree-level and next-to-leading order cross sections, of their matching to parton shower simulations, and of the merging of matched samples that differ by light-parton multiplicities. We present a computer program, MadGraph5_aMC@NLO, capable of handling all these computations -- parton-level fixed order, shower-matched, merged -- in a unified framework whose defining features are flexibility, high level of parallelisation, and human intervention limited to input physics quantities. We demonstrate the potential of the program by presenting selected phenomenological applications relevant to the LHC and to a 1-TeV $e^+e^-$ collider. While next-to-leading order results are restricted to QCD corrections to SM processes in the first public version, we show that from the user viewpoint no changes have to be expected in the case of corrections due to any given renormalisable Lagrangian, and that the implementation of these are well un...

  14. GAP: A computer program for gene assembly

    Energy Technology Data Exchange (ETDEWEB)

    Eisnstein, J.R.; Uberbacher, E.C.; Guan, X.; Mural, R.J.; Mann, R.C.

    1991-09-01

    A computer program, GAP (Gene Assembly Program), has been written to assemble and score hypothetical genes, given a DNA sequence containing the gene, and the outputs of several other programs which analyze the sequence. These programs include the codign-recognition and splice-junction-recognition modules developed in this laboratory. GAP is a prototype of a planned system in which it will be integrated with an expert system and rule base. Initial tests of GAP have been carried out with four sequences, the exons of which have been determined by biochemcial methods. The highest-scoring hypothetical genes for each of the four sequences had percent correct splice junctions ranging from 50 to 100% (average 81%) and percent correct bases ranging from 92 to 100% (average 96%). 9 refs., 1 tab.

  15. Assessment of a prototype computer colour matching system to reproduce natural tooth colour on ceramic restorations.

    Science.gov (United States)

    Kristiansen, Joshua; Sakai, Maiko; Da Silva, John D; Gil, Mindy; Ishikawa-Nagai, Shigemi

    2011-12-01

    The aim of this study was to assess the accuracy of a prototype computer colour matching (CCM) system for dental ceramics targeting the colour of natural maxillary central incisors employing a dental spectrophotometer and the Kubelka-Munk theory. Seventeen human volunteers with natural intact maxillary central incisors were selected to participate in this study. One central incisor from each subject was measured in the body region by a spectrophotometer and the reflectance values were used by the CCM system in order to generate a prescription for a ceramic mixture to reproduce the target tooth's colour. Ceramic discs were fabricated based on these prescriptions and layered on a zirconia ceramic core material of a specified colour. The colour match of each two-layered specimen to the target natural tooth was assessed by CIELAB colour coordinates (ΔE(*), ΔL(*), Δa(*) and Δb(*)). The average colour difference ΔE(*) value was 2.58±84 for the ceramic specimen-natural tooth (CS-NT) pairs. ΔL(*) values ranged from 0.17 to 2.71, Δa(*) values ranged from -1.70 to 0.61, and Δb(*) values ranged from -1.48 to 3.81. There was a moderate inverse correlation (R=-0.44, p-value=0.0721) between L(*) values for natural target teeth and ΔE(*) values; no such correlation was found for a(*) and b(*) values. The newly developed prototype CCM system has the potential to be used as an efficient tool in the reproduction of natural tooth colour. Copyright © 2011. Published by Elsevier Ltd.

  16. Matching Behavior as a Tradeoff Between Reward Maximization and Demands on Neural Computation [version 2; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Jan Kubanek

    2015-10-01

    Full Text Available When faced with a choice, humans and animals commonly distribute their behavior in proportion to the frequency of payoff of each option. Such behavior is referred to as matching and has been captured by the matching law. However, matching is not a general law of economic choice. Matching in its strict sense seems to be specifically observed in tasks whose properties make matching an optimal or a near-optimal strategy. We engaged monkeys in a foraging task in which matching was not the optimal strategy. Over-matching the proportions of the mean offered reward magnitudes would yield more reward than matching, yet, surprisingly, the animals almost exactly matched them. To gain insight into this phenomenon, we modeled the animals' decision-making using a mechanistic model. The model accounted for the animals' macroscopic and microscopic choice behavior. When the models' three parameters were not constrained to mimic the monkeys' behavior, the model over-matched the reward proportions and in doing so, harvested substantially more reward than the monkeys. This optimized model revealed a marked bottleneck in the monkeys' choice function that compares the value of the two options. The model featured a very steep value comparison function relative to that of the monkeys. The steepness of the value comparison function had a profound effect on the earned reward and on the level of matching. We implemented this value comparison function through responses of simulated biological neurons. We found that due to the presence of neural noise, steepening the value comparison requires an exponential increase in the number of value-coding neurons. Matching may be a compromise between harvesting satisfactory reward and the high demands placed by neural noise on optimal neural computation.

  17. New predictive equation for lung volume using chest computed tomography for size matching in lung transplantation.

    Science.gov (United States)

    Park, C H; Kim, T H; Lee, S; Paik, H C; Haam, S J

    2015-03-01

    Lung size matching is important in lung transplantation (LT). With advances in computed tomography (CT) technology, multidetector row CT can accurately measure the thoracic cage and lung volumes. The objective of this study was to generate a new regression equation using demographic data based on the measured CT lung volume in a healthy population to predict the CT lung volume of the donor in LT size matching. The medical records of healthy subjects who underwent chest CT scans to screen for lung cancer were retrospectively reviewed. CT lung volume was semi-automatically measured using a threshold-based auto-segmentation technique. New regression equations for CT lung volume were generated by multiple linear regression analysis using demographic data including height (H, cm), weight (W, kg), and age (A, years). The percentage error rate (%) of the equations were calculated as ([Estimated CT lung volume--Measured CT lung volume]/Measured CT lung volume × 100). A percentage error rate within ± 20% was considered acceptable. A total of 141 men aged 27 to 55 years (mean, 46.7 ± 6.2 years) and 128 women aged 20 to 55 years (mean, 45.4 ± 7.2 years) were enrolled. The final regression equations for CT lung volume were (-5.890 + 0.067 H - 0.030 W + 0.020 A) in men and (-6.698 + 0.072 H - 0.024 W) in women. The mean absolute error rate was 10.9 ± 9.0% and 11.0 ± 8.5% in men and women, respectively. Percentage error rates were within ± 20% in 121 of 141 (85.8%) men and 113 of 128 (88.3%) women. These equations could predict the CT lung volume of healthy subjects using demographic data. Using these equations, the predicted CT lung volume of donors could be matched to the measured CT lung volume of recipients in lung transplantation. Copyright © 2015 Elsevier Inc. All rights reserved.

  18. The computational physics program of the National MFE Computer Center

    Energy Technology Data Exchange (ETDEWEB)

    Mirin, A.A.

    1988-01-01

    The principal objective of the Computational Physics Group is to develop advanced numerical models for the investigation of plasma phenomena and the simulation of present and future magnetic confinement devices. Another major objective of the group is to develop efficient algorithms and programming techniques for current and future generation of supercomputers. The computational physics group is involved in several areas of fusion research. One main area is the application of Fokker-Planck/quasilinear codes to tokamaks. Another major area is the investigation of resistive magnetohydrodynamics in three dimensions, with applications to compact toroids. Another major area is the investigation of kinetic instabilities using a 3-D particle code. This work is often coupled with the task of numerically generating equilibria which model experimental devices. Ways to apply statistical closure approximations to study tokamak-edge plasma turbulence are being examined. In addition to these computational physics studies, the group has developed a number of linear systems solvers for general classes of physics problems and has been making a major effort at ascertaining how to efficiently utilize multiprocessor computers.

  19. Computational Approaches to Facilitate Epitope-Based HLA Matching in Solid Organ Transplantation

    NARCIS (Netherlands)

    Geneugelijk, Kirsten; Wissing, Jeroen; Koppenaal, Dirk; Niemann, Matthias; Spierings, Eric

    2017-01-01

    Epitope-based HLA matching has been emerged over the last few years as an improved method for HLA matching in solid organ transplantation. The epitope-based matching concept has been incorporated in both the PIRCHE-II and the HLAMatchmaker algorithm to find the most suitable donor for a recipient.

  20. COMPUTER PROGRAMMING AND ROBOTICS IN BASIC EDUCATION

    Directory of Open Access Journals (Sweden)

    José Manuel Cabrera Delgado

    2015-12-01

    Full Text Available This article aims to get an overview of the process of including the computer programming and the robotics in the educational curriculum of the basic education in several European countries, including Spain. For this purpose, the cases of Estonia and France are briefly analyzed, two countries in the European Union, which can be considered pioneers in implementing such teaching. Also, in relation to Spain, it is analyzed some of the current initiatives implemented by some Autonomous Communities in this sense.

  1. Scientific Computing in the CH Programming Language

    Directory of Open Access Journals (Sweden)

    Harry H. Cheng

    1993-01-01

    Full Text Available We have developed a general-purpose block-structured interpretive programming Ianguage. The syntax and semantics of this language called CH are similar to C. CH retains most features of C from the scientific computing point of view. In this paper, the extension of C to CH for numerical computation of real numbers will be described. Metanumbers of −0.0, 0.0, Inf, −Inf, and NaN are introduced in CH. Through these metanumbers, the power of the IEEE 754 arithmetic standard is easily available to the programmer. These metanumbers are extended to commonly used mathematical functions in the spirit of the IEEE 754 standard and ANSI C. The definitions for manipulation of these metanumbers in I/O; arithmetic, relational, and logic operations; and built-in polymorphic mathematical functions are defined. The capabilities of bitwise, assignment, address and indirection, increment and decrement, as well as type conversion operations in ANSI C are extended in CH. In this paper, mainly new linguistic features of CH in comparison to C will be described. Example programs programmed in CH with metanumbers and polymorphic mathematical functions will demonstrate capabilities of CH in scientific computing.

  2. Hand Society and Matching Program Web Sites Provide Poor Access to Information Regarding Hand Surgery Fellowship.

    Science.gov (United States)

    Hinds, Richard M; Klifto, Christopher S; Naik, Amish A; Sapienza, Anthony; Capo, John T

    2016-08-01

    The Internet is a common resource for applicants of hand surgery fellowships, however, the quality and accessibility of fellowship online information is unknown. The objectives of this study were to evaluate the accessibility of hand surgery fellowship Web sites and to assess the quality of information provided via program Web sites. Hand fellowship Web site accessibility was evaluated by reviewing the American Society for Surgery of the Hand (ASSH) on November 16, 2014 and the National Resident Matching Program (NRMP) fellowship directories on February 12, 2015, and performing an independent Google search on November 25, 2014. Accessible Web sites were then assessed for quality of the presented information. A total of 81 programs were identified with the ASSH directory featuring direct links to 32% of program Web sites and the NRMP directory directly linking to 0%. A Google search yielded direct links to 86% of program Web sites. The quality of presented information varied greatly among the 72 accessible Web sites. Program description (100%), fellowship application requirements (97%), program contact email address (85%), and research requirements (75%) were the most commonly presented components of fellowship information. Hand fellowship program Web sites can be accessed from the ASSH directory and, to a lesser extent, the NRMP directory. However, a Google search is the most reliable method to access online fellowship information. Of assessable programs, all featured a program description though the quality of the remaining information was variable. Hand surgery fellowship applicants may face some difficulties when attempting to gather program information online. Future efforts should focus on improving the accessibility and content quality on hand surgery fellowship program Web sites.

  3. NASA High Performance Computing and Communications program

    Science.gov (United States)

    Holcomb, Lee; Smith, Paul; Hunter, Paul

    1994-01-01

    The National Aeronautics and Space Administration's HPCC program is part of a new Presidential initiative aimed at producing a 1000-fold increase in supercomputing speed and a 1(X)-fold improvement in available communications capability by 1997. As more advanced technologies are developed under the HPCC program, they will be used to solve NASA's 'Grand Challenge' problems, which include improving the design and simulation of advanced aerospace vehicles, allowing people at remote locations to communicate more effectively and share information, increasing scientists' abilities to model the Earth's climate and forecast global environmental trends, and improving the development of advanced spacecraft. NASA's HPCC program is organized into three projects which are unique to the agency's mission: the Computational Aerosciences (CAS) project, the Earth and Space Sciences (ESS) project, and the Remote Exploration and Experimentation (REE) project. An additional project, the Basic Research and Human Resources (BRHR) project, exists to promote long term research in computer science and engineering and to increase the pool of trained personnel in a variety of scientific disciplines. This document presents an overview of the objectives and organization of these projects, as well as summaries of early accomplishments and the significance, status, and plans for individual research and development programs within each project. Areas of emphasis include benchmarking, testbeds, software and simulation methods.

  4. User's manual for computer program BASEPLOT

    Science.gov (United States)

    Sanders, Curtis L.

    2002-01-01

    The checking and reviewing of daily records of streamflow within the U.S. Geological Survey is traditionally accomplished by hand-plotting and mentally collating tables of data. The process is time consuming, difficult to standardize, and subject to errors in computation, data entry, and logic. In addition, the presentation of flow data on the internet requires more timely and accurate computation of daily flow records. BASEPLOT was developed for checking and review of primary streamflow records within the U.S. Geological Survey. Use of BASEPLOT enables users to (1) provide efficiencies during the record checking and review process, (2) improve quality control, (3) achieve uniformity of checking and review techniques of simple stage-discharge relations, and (4) provide a tool for teaching streamflow computation techniques. The BASEPLOT program produces tables of quality control checks and produces plots of rating curves and discharge measurements; variable shift (V-shift) diagrams; and V-shifts converted to stage-discharge plots, using data stored in the U.S. Geological Survey Automatic Data Processing System database. In addition, the program plots unit-value hydrographs that show unit-value stages, shifts, and datum corrections; input shifts, datum corrections, and effective dates; discharge measurements; effective dates for rating tables; and numeric quality control checks. Checklist/tutorial forms are provided for reviewers to ensure completeness of review and standardize the review process. The program was written for the U.S. Geological Survey SUN computer using the Statistical Analysis System (SAS) software produced by SAS Institute, Incorporated.

  5. A research program in empirical computer science

    Science.gov (United States)

    Knight, J. C.

    1991-01-01

    During the grant reporting period our primary activities have been to begin preparation for the establishment of a research program in experimental computer science. The focus of research in this program will be safety-critical systems. Many questions that arise in the effort to improve software dependability can only be addressed empirically. For example, there is no way to predict the performance of the various proposed approaches to building fault-tolerant software. Performance models, though valuable, are parameterized and cannot be used to make quantitative predictions without experimental determination of underlying distributions. In the past, experimentation has been able to shed some light on the practical benefits and limitations of software fault tolerance. It is common, also, for experimentation to reveal new questions or new aspects of problems that were previously unknown. A good example is the Consistent Comparison Problem that was revealed by experimentation and subsequently studied in depth. The result was a clear understanding of a previously unknown problem with software fault tolerance. The purpose of a research program in empirical computer science is to perform controlled experiments in the area of real-time, embedded control systems. The goal of the various experiments will be to determine better approaches to the construction of the software for computing systems that have to be relied upon. As such it will validate research concepts from other sources, provide new research results, and facilitate the transition of research results from concepts to practical procedures that can be applied with low risk to NASA flight projects. The target of experimentation will be the production software development activities undertaken by any organization prepared to contribute to the research program. Experimental goals, procedures, data analysis and result reporting will be performed for the most part by the University of Virginia.

  6. Gender Differences in the Use of Computers, Programming, and Peer Interactions in Computer Science Classrooms

    Science.gov (United States)

    Stoilescu, Dorian; Egodawatte, Gunawardena

    2010-01-01

    Research shows that female and male students in undergraduate computer science programs view computer culture differently. Female students are interested more in the use of computers than in doing programming, whereas male students see computer science mainly as a programming activity. The overall purpose of our research was not to find new…

  7. Evaluation of an online peer fundus photograph matching program in teaching direct ophthalmoscopy to medical students.

    Science.gov (United States)

    Kwok, Jason; Liao, Walter; Baxter, Stephanie

    2017-10-01

    Direct ophthalmoscopy is an important clinical skill that is often poorly performed by medical professionals and students. This is attributable to a declining emphasis on ophthalmology in medical school. We present and evaluate a self-directed approach of teaching ophthalmoscopy to medical students that is suitable for the current medical curriculum. Prospective medical education trial. Ninety-five second-year medical students at Queen's University: 32 in the experimental group and 63 in the control group. The experimental group consisted of medical students who practised ophthalmoscopy with one another using an online peer fundus photograph matching exercise created by the Department of Ophthalmology at Queen's University. To use the program, students first examined a peer with an ophthalmoscope and then selected an online photograph of a fundus corresponding to that of the examinee. The program notifies students if a correct selection is made. To encourage use of the program, students participated in a 2-week ophthalmoscopy competition during their ophthalmology rotation. The control group consisted of students who did not participate in the learning exercise. On assessment at the end of the ophthalmology rotation, the experimental group (n = 32) was more accurate in matching fundus photographs compared with the control group (n = 63) (p = 0.02). Participants were faster at performing ophthalmoscopy at the end of the learning exercise (p < 0.01). All students in the experimental group reported increased confidence levels in ophthalmoscopy after participation in the learning exercise. Matching online peer fundus photographs in a self-directed manner appeared to increase the skill and confidence of medical students in ophthalmoscopy. Copyright © 2017 Canadian Ophthalmological Society. Published by Elsevier Inc. All rights reserved.

  8. STEW A Nonlinear Data Modeling Computer Program

    CERN Document Server

    Chen, H

    2000-01-01

    A nonlinear data modeling computer program, STEW, employing the Levenberg-Marquardt algorithm, has been developed to model the experimental sup 2 sup 3 sup 9 Pu(n,f) and sup 2 sup 3 sup 5 U(n,f) cross sections. This report presents results of the modeling of the sup 2 sup 3 sup 9 Pu(n,f) and sup 2 sup 3 sup 5 U(n,f) cross-section data. The calculation of the fission transmission coefficient is based on the double-humped-fission-barrier model of Bjornholm and Lynn. Incident neutron energies of up to 5 MeV are considered.

  9. Is orthopedics more competitive today than when my attending matched? An analysis of National Resident Matching Program data for orthopedic PGY1 applicants from 1984 to 2011.

    Science.gov (United States)

    Karnes, Jonathan M; Mayerson, Joel L; Scharschmidt, Thomas J

    2014-01-01

    This study evaluated supply and demand trends for orthopedic postgraduate year 1 (PGY1) positions from 1984 to 2011 for the purpose of estimating national intercandidate competition over time. National Resident Matching Program (NRMP) data for orthopedic surgery from 1984 to 2011 were collected. Proxy variables including (total number of orthopedic applicants/number of orthopedic PGY1 positions), (number of US senior applicants to orthopedics/number of orthopedic PGY1 positions), (number of US seniors matching into orthopedics/number of US senior orthopedic applicants), (total number of matched orthopedic applicants/total number of orthopedic applicants), and (total number of US applicants who fail to match into orthopedics/total number of US senior applicants into orthopedics) as well as average United States Medical Licensing Examination Step 1 scores were used to gauge the level of competition between candidates and were compared over time. Academic medical center in the Midwestern United States. Medical professors and medical students. The NRMP data suggested that the number of positions per applicant decreased or remained stable since 1984 and that the percentage of applicants who did not match was no higher now than in the past. This finding was primarily because of the relative decrease in the ratio of applicants to available PGY1 positions, which stems from the number of positions increasing more rapidly than the number of applicants. The NRMP data from 1984 to 2011 supported our hypothesis that intercandidate competition intensity for orthopedic PGY1 positions has not increased over time. The misconception that orthopedics is becoming more competitive likely arises from the increased number of applications submitted per candidate and the resulting relative importance placed on objective criteria such as United States Medical Licensing Examination Step 1 scores when programs select interview cohorts. Copyright © 2014 Association of Program Directors in

  10. Computer programming: Science, art, or both?

    Science.gov (United States)

    Gum, Sandra Trent

    The purpose of this study was to determine if spatial intelligence contributes to a student's success in a computer science major or if mathematical-logical intelligence is sufficient data on which to base a prediction of success. The study was performed at a small university. The sample consisted of 15 computer science (CS) majors, enrolled in a computer science class, and 15 non-CS-majors, enrolled in a statistics class. Seven of the CS-majors were considered advanced and seven were considered less advanced. The independent measures were: the mathematics and the English scores from the ACT/SAT (CS-majors); a questionnaire to obtain personal information; the major area of study which compared CS-majors to all other majors; and the number of completed computer science classes (CS-majors) to determine advanced and less advanced CS-majors. The dependent measures were: a multiple intelligence inventory for adults to determine perception of intelligences; the GEFT to determine field independence independence; the Card Rotations Test to determine spatial orientation ability; the Maze Tracing Speed Test to determine spatial scanning ability; and the Surface Development test to determine visualization ability. The visualization measure correlated positively and significantly with the GEFT. The year in college correlated positively and significantly with the GEFT and visualization measure for CS-majors and correlated negatively for non-CS-majors. Although non-CS-majors scored higher on the spatial orientation measure, CS-majors scored significantly higher on the spatial scanning measure. The year in college correlated negatively with many of the measures and perceptions of intelligences among both groups; however, there were more significant negative correlations among non-CS-majors. Results indicated that experience in computer programming may increase field independence, visualization ability, and spatial scanning ability while decreasing spatial orientation ability. The

  11. Bias due to sample selection in propensity score matching for a supportive housing program evaluation in New York City.

    Directory of Open Access Journals (Sweden)

    Sungwoo Lim

    Full Text Available OBJECTIVES: Little is known about influences of sample selection on estimation in propensity score matching. The purpose of the study was to assess potential selection bias using one-to-one greedy matching versus optimal full matching as part of an evaluation of supportive housing in New York City (NYC. STUDY DESIGN AND SETTINGS: Data came from administrative data for 2 groups of applicants who were eligible for an NYC supportive housing program in 2007-09, including chronically homeless adults with a substance use disorder and young adults aging out of foster care. We evaluated the 2 matching methods in their ability to balance covariates and represent the original population, and in how those methods affected outcomes related to Medicaid expenditures. RESULTS: In the population with a substance use disorder, only optimal full matching performed well in balancing covariates, whereas both methods created representative populations. In the young adult population, both methods balanced covariates effectively, but only optimal full matching created representative populations. In the young adult population, the impact of the program on Medicaid expenditures was attenuated when one-to-one greedy matching was used, compared with optimal full matching. CONCLUSION: Given covariate balancing with both methods, attenuated program impacts in the young adult population indicated that one-to-one greedy matching introduced selection bias.

  12. 25 CFR 47.11 - Can these funds be used as matching funds for other Federal programs?

    Science.gov (United States)

    2010-04-01

    ... EDUCATION UNIFORM DIRECT FUNDING AND SUPPORT FOR BUREAU-OPERATED SCHOOLS § 47.11 Can these funds be used as matching funds for other Federal programs? A Bureau-operated school may use funds that it receives under...

  13. Selecting electrode configurations for image-guided cochlear implant programming using template matching

    Science.gov (United States)

    Zhang, Dongqing; Zhao, Yiyuan; Noble, Jack H.; Dawant, Benoit M.

    2017-03-01

    Cochlear implants (CIs) are used to treat patients with severe-to-profound hearing loss. In surgery, an electrode array is implanted in the cochlea. After implantation, the CI processor is programmed by an audiologist. One factor that negatively impacts outcomes and can be addressed by programming is cross-electrode neural stimulation overlap (NSO). In the recent past, we have proposed a system to assist the audiologist in programming the CI that we call Image-Guided CI Programming (IGCIP). IGCIP permits using CT images to detect NSO and recommend which subset of electrodes should be active to avoid NSO. In an ongoing clinical study, we have shown that IGCIP leads to significant improvement in hearing outcomes. Most of the IGCIP steps are robustly automated but electrode configuration selection still sometimes requires expert intervention. With expertise, Distance-Vs-Frequency (DVF) curves, which are a way to visualize the spatial relationship learned from CT between the electrodes and the nerves they stimulate, can be used to select the electrode configuration. In this work, we propose an automated technique for electrode configuration selection. It relies on matching new patients' DVF curves to a library of DVF curves for which electrode configurations are known. We compare this approach to one we have previously proposed. We show that, generally, our new method produces results that are as good as those obtained with our previous one while being generic and requiring fewer parameters.

  14. Effects of the Positive Action program on achievement and discipline: two matched-control comparisons.

    Science.gov (United States)

    Flay, B R; Allred, C G; Ordway, N

    2001-06-01

    This paper reports on the effectiveness of an integrated comprehensive school model for character development, problem behavior prevention, and academic achievement enhancement. The Positive Action program consists of a school curriculum, together with schoolwide climate, family, and community components. As evaluated here, the yearly K-6 curriculum consists of over 140 fifteen-to-twenty-minute lessons per year delivered in school classrooms on an almost daily basis. The program is based on theories of self-concept, learning, behavior, and school ecology. We use a matched control design and school-level achievement and disciplinary data to evaluate program effects on student performance and behavior in two separate school districts. The program improved achievement by 16% in one district and 52% in another, and reduced disciplinary referrals by 78% in one district and 85% in the other. We discuss implications of these replicated findings for the prevention of substance abuse and violence, the improvement of school performance, and the reform of American schools.

  15. Human operator identification model and related computer programs

    Science.gov (United States)

    Kessler, K. M.; Mohr, J. N.

    1978-01-01

    Four computer programs which provide computational assistance in the analysis of man/machine systems are reported. The programs are: (1) Modified Transfer Function Program (TF); (2) Time Varying Response Program (TVSR); (3) Optimal Simulation Program (TVOPT); and (4) Linear Identification Program (SCIDNT). The TV program converts the time domain state variable system representative to frequency domain transfer function system representation. The TVSR program computes time histories of the input/output responses of the human operator model. The TVOPT program is an optimal simulation program and is similar to TVSR in that it produces time histories of system states associated with an operator in the loop system. The differences between the two programs are presented. The SCIDNT program is an open loop identification code which operates on the simulated data from TVOPT (or TVSR) or real operator data from motion simulators.

  16. Computer Simulation and New Ways of Creating Matched-Guise Techniques

    Science.gov (United States)

    Connor, Robert T.

    2008-01-01

    Matched-guise experiments have passed their 40th year as a powerful attitudinal research tool, and they are becoming more relevant and useful as technology is applied to language research. Combining the specificity of conversation analysis with the generalizability of social psychology research, technological innovations allow the measurement of…

  17. Experiences with Efficient Methodologies for Teaching Computer Programming to Geoscientists

    Science.gov (United States)

    Jacobs, Christian T.; Gorman, Gerard J.; Rees, Huw E.; Craig, Lorraine E.

    2016-01-01

    Computer programming was once thought of as a skill required only by professional software developers. But today, given the ubiquitous nature of computation and data science it is quickly becoming necessary for all scientists and engineers to have at least a basic knowledge of how to program. Teaching how to program, particularly to those students…

  18. Computer Programs for Characteristic Modes of Bodies of Revolution

    Science.gov (United States)

    Computer programs are given for calculating the characteristic currents and characteristic gain patterns of conducting bodies of revolution. Also...given are computer programs for using these characteristic currents in aperture radiation and plane-wave scattering problems. Plot programs for use with

  19. 01010000 01001100 01000001 01011001: Play Elements in Computer Programming

    Science.gov (United States)

    Breslin, Samantha

    2013-01-01

    This article explores the role of play in human interaction with computers in the context of computer programming. The author considers many facets of programming including the literary practice of coding, the abstract design of programs, and more mundane activities such as testing, debugging, and hacking. She discusses how these incorporate the…

  20. ROUTES: a computer program for preliminary route location.

    Science.gov (United States)

    S.E. Reutebuch

    1988-01-01

    An analytical description of the ROUTES computer program is presented. ROUTES is part of the integrated preliminary harvest- and transportation-planning software package, PLANS. The ROUTES computer program is useful where grade and sideslope limitations are important in determining routes for vehicular travel. With the program, planners can rapidly identify route...

  1. Programs=data=first-class citizens in a computational world

    DEFF Research Database (Denmark)

    Jones, Neil; Simonsen, Jakob Grue

    2012-01-01

    From a programming perspective, Alan Turing's epochal 1936 paper on computable functions introduced several new concepts, including what is today known as self-interpreters and programs as data, and invented a great many now-common programming techniques. We begin by reviewing Turing's contribution...... from a programming perspective; and then systematize and mention some of the many ways that later developments in models of computation (MOCs) have interacted with computability theory and programming language research. Next, we describe the ‘blob’ MOC: a recent stored-program computational model...... without pointers. In the blob model, programs are truly first-class citizens, capable of being automatically compiled, or interpreted, or executed directly. Further, the blob model appears closer to being physically realizable than earlier computation models. In part, this is due to strong finiteness...

  2. The accuracy of matching three-dimensional photographs with skin surfaces derived from cone-beam computed tomography.

    Science.gov (United States)

    Maal, T J J; Plooij, J M; Rangel, F A; Mollemans, W; Schutyser, F A C; Bergé, S J

    2008-07-01

    The state-of-the-art diagnostic tools in oral and maxillofacial surgery and preoperative orthodontic treatment are mainly two-dimensional, and consequently reveal limitations in describing the three-dimensional (3D) structures of a patient's face. New 3D imaging techniques, such as 3D stereophotogrammetry (3D photograph) and cone-beam computed tomography (CBCT), have been introduced. Image fusion, i.e. registration of a 3D photograph upon a CBCT, results in an accurate and photorealistic digital 3D data set of a patient's face. The purpose of this study was to determine the accuracy of three different matching procedures. For 15 individuals the textured skin surface (3D photograph) and untextured skin surface (CBCT) were matched by two observers using three different methods to determine the accuracy of registration. The registration error was computed as the difference (mm) between all points of both surfaces. The registration errors were relatively large at the lateral neck, mouth and around the eyes. After exclusion of artefact regions from the matching process, 90% of the error was within+/-1.5 mm. The remaining error was probably caused by differences in head positioning, different facial expressions and artefacts during image acquisition. In conclusion, the 3D data set provides an accurate and photorealistic digital 3D representation of a patient's face.

  3. Stochastic linear programming models, theory, and computation

    CERN Document Server

    Kall, Peter

    2011-01-01

    This new edition of Stochastic Linear Programming: Models, Theory and Computation has been brought completely up to date, either dealing with or at least referring to new material on models and methods, including DEA with stochastic outputs modeled via constraints on special risk functions (generalizing chance constraints, ICC’s and CVaR constraints), material on Sharpe-ratio, and Asset Liability Management models involving CVaR in a multi-stage setup. To facilitate use as a text, exercises are included throughout the book, and web access is provided to a student version of the authors’ SLP-IOR software. Additionally, the authors have updated the Guide to Available Software, and they have included newer algorithms and modeling systems for SLP. The book is thus suitable as a text for advanced courses in stochastic optimization, and as a reference to the field. From Reviews of the First Edition: "The book presents a comprehensive study of stochastic linear optimization problems and their applications. … T...

  4. Macroevolution simulated with autonomously replicating computer programs.

    Science.gov (United States)

    Yedid, Gabriel; Bell, Graham

    The process of adaptation occurs on two timescales. In the short term, natural selection merely sorts the variation already present in a population, whereas in the longer term genotypes quite different from any that were initially present evolve through the cumulation of new mutations. The first process is described by the mathematical theory of population genetics. However, this theory begins by defining a fixed set of genotypes and cannot provide a satisfactory analysis of the second process because it does not permit any genuinely new type to arise. The evolutionary outcome of selection acting on novel variation arising over long periods is therefore difficult to predict. The classical problem of this kind is whether 'replaying the tape of life' would invariably lead to the familiar organisms of the modern biota. Here we study the long-term behaviour of populations of autonomously replicating computer programs and find that the same type, introduced into the same simple environment, evolves on any given occasion along a unique trajectory towards one of many well-adapted end points.

  5. Basis And Application Of The CARES/LIFE Computer Program

    Science.gov (United States)

    Nemeth, Noel N.; Janosik, Lesley A.; Gyekenyesi, John P.; Powers, Lynn M.

    1996-01-01

    Report discusses physical and mathematical basis of Ceramics Analysis and Reliability Evaluation of Structures LIFE prediction (CARES/LIFE) computer program, described in "Program for Evaluation of Reliability of Ceramic Parts" (LEW-16018).

  6. Positioning Continuing Education Computer Programs for the Corporate Market.

    Science.gov (United States)

    Tilney, Ceil

    1993-01-01

    Summarizes the findings of the market assessment phase of Bellevue Community College's evaluation of its continuing education computer training program. Indicates that marketing efforts must stress program quality and software training to help overcome strong antiacademic client sentiment. (MGB)

  7. Computer program to calculate three-dimensional boundary layer flows over wings with wall mass transfer

    Science.gov (United States)

    Mclean, J. D.; Randall, J. L.

    1979-01-01

    A system of computer programs for calculating three dimensional transonic flow over wings, including details of the three dimensional viscous boundary layer flow, was developed. The flow is calculated in two overlapping regions: an outer potential flow region, and a boundary layer region in which the first order, three dimensional boundary layer equations are numerically solved. A consistent matching of the two solutions is achieved iteratively, thus taking into account viscous-inviscid interaction. For the inviscid outer flow calculations, the Jameson-Caughey transonic wing program FLO 27 is used, and the boundary layer calculations are performed by a finite difference boundary layer prediction program. Interface programs provide communication between the two basic flow analysis programs. Computed results are presented for the NASA F8 research wing, both with and without distributed surface suction.

  8. Non-rigid Point Matching using Topology Preserving Constraints for Medical Computer Vision

    Directory of Open Access Journals (Sweden)

    Jong-Ha Lee

    2017-01-01

    Full Text Available This work presents a novel algorithm of finding correspondence using a relaxation labeling. For the variance experiments, the variance of all algorithms except the proposed algorithm is large. The largest variance of the proposed algorithm is +0.01 in the 0.08 deformation test of a character. Overall, the proposed algorithm outperforms compared to the rest of algorithms. Except the proposed algorithm, matching with neighborhood algorithm shows the best performance except an outlier to data ratio in a character test. The proposed algorithm shows the best performance as well as an outlier to data ratio in a character test.

  9. Gradient matching methods for computational inference in mechanistic models for systems biology: a review and comparative analysis

    Directory of Open Access Journals (Sweden)

    Benn eMacdonald

    2015-11-01

    Full Text Available Parameter inference in mathematical models of biological pathways, expressed as coupled ordinary differential equations (ODEs, is a challenging problem in contemporary systems biology. Conventional methods involve repeatedly solving the ODEs by numerical integration, which is computationally onerous and does not scale up to complex systems. Aimed at reducing the computational costs, new concepts based on gradient matching have recently been proposed in the computational statistics and machine learning literature. In a preliminary smoothing step, the time series data are interpolated; then, in a second step, the parameters of the ODEs are optimised so as to minimise some metric measuring the difference between the slopes of the tangents to the interpolants, and the time derivatives from the ODEs. In this way, the ODEs never have to be solved explicitly. This review provides a concise methodological overview of the current state-of-the-art methods for gradient matching in ODEs, followed by an empirical comparative evaluation based on a set of widely used and representative benchmark data.

  10. Connecting game theory and evolutionary network control for the computational control of soccer matches

    Directory of Open Access Journals (Sweden)

    Alessandro Ferrarini

    2015-03-01

    Full Text Available Game theory, also known as interactive decision theory, is an umbrella term for the logical side of decision science, including both human and non-human events. In this paper a new game theory model is introduced in order to tame complex human events like soccer matches. Soccer-Decoder is a math algorithm recently introduced in order to simulate soccer matches by merging together 3 scientific methods: game theory, differential calculus and stochastic simulations. The philosophy behind Soccer-Decoder is that even very complex real world events, when turned into their irreducible essence, can be understood and predicted. In this work, Soccer-Decoder is combined with Evolutionary Network Control in order to provide a proficient tool to decide the most proper game strategies for determining winning strategies in soccer events. An illustrative example is given. The ratio behind this work is that even very complex real world events can be simulated and then controlled when using appropriate scientific tools.

  11. Use of 3D ultrasound and image matching in computer-assisted neuronavigation

    Science.gov (United States)

    Maier, Michael W.; Kriete, Andres

    1997-06-01

    In most operation theaters today planning is done using pre- operatively gathered data, such as CT, MRI, or ultrasound (US). This data can become useless in cases such as lesion removal in brain, where dura opening and other preparations cause tissue shifting. A possibility to greatly increase accuracy in an ongoing operation is the use of 3D ultrasonography. The sequences of intra-operatively obtained 2D US-slices can be transformed into 3D, matched to previously acquired data, and be used to adapt the surgical planning to the current situation. The matching is done after standard image processing procedures have been applied to the 2D US data, this data has been injected into a 3D data cube, segmentation, and topological differentiation have taken place. This requires the usage of highly sophisticated graphics workstations. The objective is to create a framework in which surgeons and/or robotic neuronavigators can be informed and guided with the newest and most precise information possible during an operation.

  12. The Outlook for Computer Professions: 1985 Rewrites the Program.

    Science.gov (United States)

    Drake, Larry

    1986-01-01

    The author states that graduates of junior college programs who learn COBOL will continue to find jobs, but employers will increasingly seek college graduates when filling positions for computer programers and systems analysts. Areas of growth for computer applications (services, military, data communications, and artificial intelligence) are…

  13. Basic BASIC; An Introduction to Computer Programming in BASIC Language.

    Science.gov (United States)

    Coan, James S.

    With the increasing availability of computer access through remote terminals and time sharing, more and more schools and colleges are able to introduce programing to substantial numbers of students. This book is an attempt to incorporate computer programming, using BASIC language, and the teaching of mathematics. The general approach of the book…

  14. A Computer Program for Short Circuit Analysis of Electric Power ...

    African Journals Online (AJOL)

    This paper described the mathematical basis and computational framework of a computer program developed for short circuit studies of electric power systems. The Short Circuit Analysis Program (SCAP) is to be used to assess the composite effects of unbalanced and balanced faults on the overall reliability of electric ...

  15. Software survey: VOSviewer, a computer program for bibliometric mapping

    NARCIS (Netherlands)

    N.J.P. van Eck (Nees Jan); L. Waltman (Ludo)

    2010-01-01

    textabstractWe present VOSviewer, a freely available computer program that we have developed for constructing and viewing bibliometric maps. Unlike most computer programs that are used for bibliometric mapping, VOSviewer pays special attention to the graphical representation of bibliometric maps.

  16. Near-Surface Seismic Velocity Data: A Computer Program For ...

    African Journals Online (AJOL)

    A computer program (NESURVELANA) has been developed in Visual Basic Computer programming language to carry out a near surface velocity analysis. The method of analysis used includes: Algorithms design and Visual Basic codes generation for plotting arrival time (ms) against geophone depth (m) employing the ...

  17. Case Studies of Liberal Arts Computer Science Programs

    Science.gov (United States)

    Baldwin, D.; Brady, A.; Danyluk, A.; Adams, J.; Lawrence, A.

    2010-01-01

    Many undergraduate liberal arts institutions offer computer science majors. This article illustrates how quality computer science programs can be realized in a wide variety of liberal arts settings by describing and contrasting the actual programs at five liberal arts colleges: Williams College, Kalamazoo College, the State University of New York…

  18. Programming language for computations in the Interkosmos program

    Science.gov (United States)

    Schmidt, K.

    1975-01-01

    The programming system for Intercosmos data processing, based on the structural programming theory, which considers a program as an ordered set of standardized elementary parts, from which the user programs are automatically generated, is described. The programs are comprised of several modules, which are briefly summarized. The general structure of the programming system is presented in a block diagram. A programming control language developed to formulate the problem quickly and completely is presented along with basic symbols which are characteristic of the Intercosmos programming system.

  19. The NMR solution structure of the artificial protein M7 matches the computationally designed model

    NARCIS (Netherlands)

    Stordeur, C.; Dallüge, R.; Birkenmeier, O.; Wienk, H.L.J.|info:eu-repo/dai/nl/203884884; Rudolph, R.; Lange, C.; Lücke, C.

    2008-01-01

    Rapid progress has been made in the field of protein design over the past couple of years. Computational design algorithms have been used to (i) stabilize naturally occurring proteins,[1][2] (ii) increase the solubility of membrane proteins,[3] and (iii) create de novo proteins that feature

  20. Method and computer program product for maintenance and modernization backlogging

    Science.gov (United States)

    Mattimore, Bernard G; Reynolds, Paul E; Farrell, Jill M

    2013-02-19

    According to one embodiment, a computer program product for determining future facility conditions includes a computer readable medium having computer readable program code stored therein. The computer readable program code includes computer readable program code for calculating a time period specific maintenance cost, for calculating a time period specific modernization factor, and for calculating a time period specific backlog factor. Future facility conditions equal the time period specific maintenance cost plus the time period specific modernization factor plus the time period specific backlog factor. In another embodiment, a computer-implemented method for calculating future facility conditions includes calculating a time period specific maintenance cost, calculating a time period specific modernization factor, and calculating a time period specific backlog factor. Future facility conditions equal the time period specific maintenance cost plus the time period specific modernization factor plus the time period specific backlog factor. Other embodiments are also presented.

  1. An Experimental Investigation of Computer Program Development Approaches and Computer Programming Metrics.

    Science.gov (United States)

    1979-12-01

    Approved for plbi elaSO; 81 1ibutio u0lim t 03 /1 Technical Report TR-853 December 1979 An Experimental Investigation of Computer Program Development...this Report) Approved for public release; distribution unlimited. 17. DISTRIBUTION STATEMENT (of rhe ah.tr.ct entled i f [31-k 20, ! dil(enot fo, ).R...55t -3 O 2 a. tL loco o.uaZ 4 1 0 0 - .. a .CO acca 4 * ao -- c- - .an za-e~a- 2.5 aa34z98ba a- CHAPTER VII coipletely differentiated outcome is

  2. Designing Educational Games for Computer Programming: A Holistic Framework

    Science.gov (United States)

    Malliarakis, Christos; Satratzemi, Maya; Xinogalos, Stelios

    2014-01-01

    Computer science is continuously evolving during the past decades. This has also brought forth new knowledge that should be incorporated and new learning strategies must be adopted for the successful teaching of all sub-domains. For example, computer programming is a vital knowledge area within computer science with constantly changing curriculum…

  3. Seventy Years of Computing in the Nuclear Weapons Program

    Energy Technology Data Exchange (ETDEWEB)

    Archer, Billy Joe [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-30

    Los Alamos has continuously been on the forefront of scientific computing since it helped found the field. This talk will explore the rich history of computing in the Los Alamos weapons program. The current status of computing will be discussed, as will the expectations for the near future.

  4. A Methodology for Teaching Computer Programming: first year students’ perspective

    OpenAIRE

    Bassey Isong

    2014-01-01

    The teaching of computer programming is one of the greatest challenges that have remained for years in Computer Science Education. A particular case is computer programming course for the beginners. While the traditional objectivist lecture-based approaches do not actively engage students to achieve their learning outcome, we believe that integrating some cutting-edge processes and practices like agile method into the teaching approaches will be leverage. Agile software development has gained...

  5. Attitude, Gender and Achievement in Computer Programming

    Science.gov (United States)

    Baser, Mustafa

    2013-01-01

    The aim of this research was to explore the relationship among students' attitudes toward programming, gender and academic achievement in programming. The scale used for measuring students' attitudes toward programming was developed by the researcher and consisted of 35 five-point Likert type items in four subscales. The scale was administered to…

  6. A novel workflow for computer guided implant surgery matching digital dental casts and CBCT scan

    OpenAIRE

    DE VICO, G.; Ferraris, F.; ARCURI, L.; Guzzo, F.; SPINELLI, D.

    2016-01-01

    Nowadays computer-guided “flap-less” surgery for implant placement using stereolithographic tem-plates is gaining popularity among clinicians and patients. The advantages of this surgical protocol are its minimally invasive nature, accuracy of implant placement, predictability, less post-surgical discomfort and reduced time required for definitive rehabilitation. Aim of this work is to describe a new protocol (Smart Fusion by Nobel Biocare), thanks to which is now possible to do a mini-invasi...

  7. Compute-unified device architecture implementation of a block-matching algorithm for multiple graphical processing unit cards

    Science.gov (United States)

    Massanes, Francesc; Cadennes, Marie; Brankov, Jovan G.

    2011-07-01

    We describe and evaluate a fast implementation of a classical block-matching motion estimation algorithm for multiple graphical processing units (GPUs) using the compute unified device architecture computing engine. The implemented block-matching algorithm uses summed absolute difference error criterion and full grid search (FS) for finding optimal block displacement. In this evaluation, we compared the execution time of a GPU and CPU implementation for images of various sizes, using integer and noninteger search grids. The results show that use of a GPU card can shorten computation time by a factor of 200 times for integer and 1000 times for a noninteger search grid. The additional speedup for a noninteger search grid comes from the fact that GPU has built-in hardware for image interpolation. Further, when using multiple GPU cards, the presented evaluation shows the importance of the data splitting method across multiple cards, but an almost linear speedup with a number of cards is achievable. In addition, we compared the execution time of the proposed FS GPU implementation with two existing, highly optimized nonfull grid search CPU-based motion estimations methods, namely implementation of the Pyramidal Lucas Kanade Optical flow algorithm in OpenCV and simplified unsymmetrical multi-hexagon search in H.264/AVC standard. In these comparisons, FS GPU implementation still showed modest improvement even though the computational complexity of FS GPU implementation is substantially higher than non-FS CPU implementation. We also demonstrated that for an image sequence of 720 × 480 pixels in resolution commonly used in video surveillance, the proposed GPU implementation is sufficiently fast for real-time motion estimation at 30 frames-per-second using two NVIDIA C1060 Tesla GPU cards.

  8. Compute-unified device architecture implementation of a block-matching algorithm for multiple graphical processing unit cards.

    Science.gov (United States)

    Massanes, Francesc; Cadennes, Marie; Brankov, Jovan G

    2011-07-01

    In this paper we describe and evaluate a fast implementation of a classical block matching motion estimation algorithm for multiple Graphical Processing Units (GPUs) using the Compute Unified Device Architecture (CUDA) computing engine. The implemented block matching algorithm (BMA) uses summed absolute difference (SAD) error criterion and full grid search (FS) for finding optimal block displacement. In this evaluation we compared the execution time of a GPU and CPU implementation for images of various sizes, using integer and non-integer search grids.The results show that use of a GPU card can shorten computation time by a factor of 200 times for integer and 1000 times for a non-integer search grid. The additional speedup for non-integer search grid comes from the fact that GPU has built-in hardware for image interpolation. Further, when using multiple GPU cards, the presented evaluation shows the importance of the data splitting method across multiple cards, but an almost linear speedup with a number of cards is achievable.In addition we compared execution time of the proposed FS GPU implementation with two existing, highly optimized non-full grid search CPU based motion estimations methods, namely implementation of the Pyramidal Lucas Kanade Optical flow algorithm in OpenCV and Simplified Unsymmetrical multi-Hexagon search in H.264/AVC standard. In these comparisons, FS GPU implementation still showed modest improvement even though the computational complexity of FS GPU implementation is substantially higher than non-FS CPU implementation.We also demonstrated that for an image sequence of 720×480 pixels in resolution, commonly used in video surveillance, the proposed GPU implementation is sufficiently fast for real-time motion estimation at 30 frames-per-second using two NVIDIA C1060 Tesla GPU cards.

  9. 75 FR 31457 - Office of Child Support Enforcement; Privacy Act of 1974; Computer Matching Agreement

    Science.gov (United States)

    2010-06-03

    ... State agencies administering unemployment compensation (UC) programs. DATES: The Department of Health..., which contains new hire, QW, and unemployment insurance information. Disclosures of NDNH information to... be conducted without any change and each party to the agreement certifies to the Board in writing...

  10. The Use of Model Matching Video Analysis and Computational Simulation to Study the Ankle Sprain Injury Mechanism

    Directory of Open Access Journals (Sweden)

    Daniel Tik-Pui Fong

    2012-10-01

    Full Text Available Lateral ankle sprains continue to be the most common injury sustained by athletes and create an annual healthcare burden of over $4 billion in the U.S. alone. Foot inversion is suspected in these cases, but the mechanism of injury remains unclear. While kinematics and kinetics data are crucial in understanding the injury mechanisms, ligament behaviour measures – such as ligament strains – are viewed as the potential causal factors of ankle sprains. This review article demonstrates a novel methodology that integrates model matching video analyses with computational simulations in order to investigate injury-producing events for a better understanding of such injury mechanisms. In particular, ankle joint kinematics from actual injury incidents were deduced by model matching video analyses and then input into a generic computational model based on rigid bone surfaces and deformable ligaments of the ankle so as to investigate the ligament strains that accompany these sprain injuries. These techniques may have the potential for guiding ankle sprain prevention strategies and targeted rehabilitation therapies.

  11. Generic Assessment Rubrics for Computer Programming Courses

    Science.gov (United States)

    Mustapha, Aida; Samsudin, Noor Azah; Arbaiy, Nurieze; Mohammed, Rozlini; Hamid, Isredza Rahmi

    2016-01-01

    In programming, one problem can usually be solved using different logics and constructs but still producing the same output. Sometimes students get marked down inappropriately if their solutions do not follow the answer scheme. In addition, lab exercises and programming assignments are not necessary graded by the instructors but most of the time…

  12. Instructional Uses of the Computer: Program Force

    Science.gov (United States)

    Ostrander, P.

    1975-01-01

    Describes a program which simulates motion in two dimensions of a point mass subject to a force which is a function of position, velocity, or time. Sample applications are noted and a source of a complete list of applications and programs is given. (GH)

  13. Introduction of handheld computing to a family practice residency program.

    Science.gov (United States)

    Rao, Goutham

    2002-01-01

    Handheld computers are valuable practice tools. It is important for residency programs to introduce their trainees and faculty to this technology. This article describes a formal strategy to introduce handheld computing to a family practice residency program. Objectives were selected for the handheld computer training program that reflected skills physicians would find useful in practice. TRGpro handheld computers preloaded with a suite of medical reference programs, a medical calculator, and a database program were supplied to participants. Training consisted of four 1-hour modules each with a written evaluation quiz. Participants completed a self-assessment questionnaire after the program to determine their ability to meet each objective. Sixty of the 62 participants successfully completed the training program. The mean composite score on quizzes was 36 of 40 (90%), with no significant differences by level of residency training. The mean self-ratings of participants across all objectives was 3.31 of 4.00. Third-year residents had higher mean self-ratings than others (mean of group, 3.62). Participants were very comfortable with practical skills, such as using drug reference software, and less comfortable with theory, such as knowing the different types of handheld computers available. Structured training is a successful strategy for introducing handheld computing to a residency program.

  14. II - Detector simulation for the LHC and beyond : how to match computing resources and physics requirements

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    Detector simulation at the LHC is one of the most computing intensive activities. In these lectures we will show how physics requirements were met for the LHC experiments and extrapolate to future experiments (FCC-hh case). At the LHC, detectors are complex, very precise and ambitious: this implies modern modelisation tools for geometry and response. Events are busy and characterised by an unprecedented energy scale with hundreds of particles to be traced and high energy showers to be accurately simulated. Furthermore, high luminosities imply many events in a bunch crossing and many bunch crossings to be considered at the same time. In addition, backgrounds not directly correlated to bunch crossings have also to be taken into account. Solutions chosen for ATLAS (a mixture of detailed simulation and fast simulation/parameterisation) will be described and CPU and memory figures will be given. An extrapolation to the FCC-hh case will be tried by taking as example the calorimeter simulation.

  15. I - Detector Simulation for the LHC and beyond: how to match computing resources and physics requirements

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    Detector simulation at the LHC is one of the most computing intensive activities. In these lectures we will show how physics requirements were met for the LHC experiments and extrapolate to future experiments (FCC-hh case). At the LHC, detectors are complex, very precise and ambitious: this implies modern modelisation tools for geometry and response. Events are busy and characterised by an unprecedented energy scale with hundreds of particles to be traced and high energy showers to be accurately simulated. Furthermore, high luminosities imply many events in a bunch crossing and many bunch crossings to be considered at the same time. In addition, backgrounds not directly correlated to bunch crossings have also to be taken into account. Solutions chosen for ATLAS (a mixture of detailed simulation and fast simulation/parameterisation) will be described and CPU and memory figures will be given. An extrapolation to the FCC-hh case will be tried by taking as example the calorimeter simulation.

  16. Teacher Training Programs for Computer Education and Computer Assisted Education in Turkey

    Science.gov (United States)

    Usun, Salih

    2007-01-01

    The aim of this descriptive study is to review the applications and problems on the teacher training programs for computer education and computer assisted education (CAE) in Turkey. The study, firstly, introduces some applications and major problems on using instructional media and computers in developing countries and instructional technology…

  17. A computer program for planimetric analysis of digitized images

    DEFF Research Database (Denmark)

    Lynnerup, N; Lynnerup, O; Homøe, P

    1992-01-01

    bones as seen on X-rays. By placing the X-rays on a digitizer tablet and tracing the outline of the cell system, the area was calculated by the program. The calculated data and traced images could be stored and printed. The program is written in BASIC; necessary hardware is an IBM-compatible personal......Planimetrical measurements are made to calculate the area of an entity. By digitizing the entity the planimetrical measurements may be done by computer. This computer program was developed in conjunction with a research project involving measurement of the pneumatized cell system of the temporal...... computer, a digitizer tablet and a printer....

  18. Estimating the Counterfactual Impact of Conservation Programs on Land Cover Outcomes: The Role of Matching and Panel Regression Techniques.

    Science.gov (United States)

    Jones, Kelly W; Lewis, David J

    2015-01-01

    Deforestation and conversion of native habitats continues to be the leading driver of biodiversity and ecosystem service loss. A number of conservation policies and programs are implemented--from protected areas to payments for ecosystem services (PES)--to deter these losses. Currently, empirical evidence on whether these approaches stop or slow land cover change is lacking, but there is increasing interest in conducting rigorous, counterfactual impact evaluations, especially for many new conservation approaches, such as PES and REDD, which emphasize additionality. In addition, several new, globally available and free high-resolution remote sensing datasets have increased the ease of carrying out an impact evaluation on land cover change outcomes. While the number of conservation evaluations utilizing 'matching' to construct a valid control group is increasing, the majority of these studies use simple differences in means or linear cross-sectional regression to estimate the impact of the conservation program using this matched sample, with relatively few utilizing fixed effects panel methods--an alternative estimation method that relies on temporal variation in the data. In this paper we compare the advantages and limitations of (1) matching to construct the control group combined with differences in means and cross-sectional regression, which control for observable forms of bias in program evaluation, to (2) fixed effects panel methods, which control for observable and time-invariant unobservable forms of bias, with and without matching to create the control group. We then use these four approaches to estimate forest cover outcomes for two conservation programs: a PES program in Northeastern Ecuador and strict protected areas in European Russia. In the Russia case we find statistically significant differences across estimators--due to the presence of unobservable bias--that lead to differences in conclusions about effectiveness. The Ecuador case illustrates that

  19. Estimating the Counterfactual Impact of Conservation Programs on Land Cover Outcomes: The Role of Matching and Panel Regression Techniques.

    Directory of Open Access Journals (Sweden)

    Kelly W Jones

    Full Text Available Deforestation and conversion of native habitats continues to be the leading driver of biodiversity and ecosystem service loss. A number of conservation policies and programs are implemented--from protected areas to payments for ecosystem services (PES--to deter these losses. Currently, empirical evidence on whether these approaches stop or slow land cover change is lacking, but there is increasing interest in conducting rigorous, counterfactual impact evaluations, especially for many new conservation approaches, such as PES and REDD, which emphasize additionality. In addition, several new, globally available and free high-resolution remote sensing datasets have increased the ease of carrying out an impact evaluation on land cover change outcomes. While the number of conservation evaluations utilizing 'matching' to construct a valid control group is increasing, the majority of these studies use simple differences in means or linear cross-sectional regression to estimate the impact of the conservation program using this matched sample, with relatively few utilizing fixed effects panel methods--an alternative estimation method that relies on temporal variation in the data. In this paper we compare the advantages and limitations of (1 matching to construct the control group combined with differences in means and cross-sectional regression, which control for observable forms of bias in program evaluation, to (2 fixed effects panel methods, which control for observable and time-invariant unobservable forms of bias, with and without matching to create the control group. We then use these four approaches to estimate forest cover outcomes for two conservation programs: a PES program in Northeastern Ecuador and strict protected areas in European Russia. In the Russia case we find statistically significant differences across estimators--due to the presence of unobservable bias--that lead to differences in conclusions about effectiveness. The Ecuador case

  20. Intelligent physical blocks for introducing computer programming in developing countries

    CSIR Research Space (South Africa)

    Smith, Adrew C

    2007-05-01

    Full Text Available This paper reports on the evaluation of a novel affordable system that incorporates intelligent physical blocks to introduce illiterate children in developing countries to the logical thinking process required in computer programming. Both...

  1. Advanced wellbore thermal simulator GEOTEMP2. Appendix. Computer program listing

    Energy Technology Data Exchange (ETDEWEB)

    Mitchell, R.F.

    1982-02-01

    This appendix gives the program listing of GEOTEMP2 with comments and discussion to make the program organization more understandable. This appendix is divided into an introduction and four main blocks of code: main program, program initiation, wellbore flow, and wellbore heat transfer. The purpose and use of each subprogram is discussed and the program listing is given. Flowcharts will be included to clarify code organization when needed. GEOTEMP2 was written in FORTRAN IV. Efforts have been made to keep the programing as conventional as possible so that GEOTEMP2 will run without modification on most computers.

  2. Architecture and Programming Models for High Performance Intensive Computation

    Science.gov (United States)

    2016-06-29

    AFRL-AFOSR-VA-TR-2016-0230 Architecture and Programming Models for High Performance Intensive Computation XiaoMing Li UNIVERSITY OF DELAWARE Final...TITLE AND SUBTITLE Architecture and Programming Models for High Performance Intensive Computation 5a. CONTRACT NUMBER 5b. GRANT NUMBER FA9550-13-1-0213...developing an efficient system architecture and software tools for building and running Dynamic Data Driven Application Systems (DDDAS). The foremost

  3. Computing the Line Index of Balance Using Integer Programming Optimisation

    OpenAIRE

    Aref, Samin; Andrew J. Mason; Wilson, Mark C.

    2017-01-01

    An important measure of a signed graph is the line index of balance which has several applications in many fields. However, this graph-theoretic measure was underused for decades because of the inherent complexity in its computation which is closely related to solving NP-hard graph optimisation problems like MAXCUT. We develop new quadratic and linear programming models to compute the line index of balance exactly. Using the Gurobi integer programming optimisation solver, we evaluate the line...

  4. Software survey: VOSviewer, a computer program for bibliometric mapping

    OpenAIRE

    van Eck, Nees Jan; Waltman, Ludo

    2010-01-01

    textabstractWe present VOSviewer, a freely available computer program that we have developed for constructing and viewing bibliometric maps. Unlike most computer programs that are used for bibliometric mapping, VOSviewer pays special attention to the graphical representation of bibliometric maps. The functionality of VOSviewer is especially useful for displaying large bibliometric maps in an easy-to-interpret way. The paper consists of three parts. In the first part, an overview of VOSviewer'...

  5. Newnes circuit calculations pocket book with computer programs

    CERN Document Server

    Davies, Thomas J

    2013-01-01

    Newnes Circuit Calculations Pocket Book: With Computer Programs presents equations, examples, and problems in circuit calculations. The text includes 300 computer programs that help solve the problems presented. The book is comprised of 20 chapters that tackle different aspects of circuit calculation. The coverage of the text includes dc voltage, dc circuits, and network theorems. The book also covers oscillators, phasors, and transformers. The text will be useful to electrical engineers and other professionals whose work involves electronic circuitry.

  6. Computer program compatible with a laser nephelometer

    Science.gov (United States)

    Paroskie, R. M.; Blau, H. H., Jr.; Blinn, J. C., III

    1975-01-01

    The laser nephelometer data system was updated to provide magnetic tape recording of data, and real time or near real time processing of data to provide particle size distribution and liquid water content. Digital circuits were provided to interface the laser nephelometer to a Data General Nova 1200 minicomputer. Communications are via a teletypewriter. A dual Linc Magnetic Tape System is used for program storage and data recording. Operational programs utilize the Data General Real-Time Operating System (RTOS) and the ERT AIRMAP Real-Time Operating System (ARTS). The programs provide for acquiring data from the laser nephelometer, acquiring data from auxiliary sources, keeping time, performing real time calculations, recording data and communicating with the teletypewriter.

  7. Contributions to computational stereology and parallel programming

    DEFF Research Database (Denmark)

    Rasmusson, Allan

    Stereology is the science of interpreting 3D structures from 2D sections planes and it is used in a multitude of disciplines including bioscience, material science and more. At its core is the use of random systematic sampling and geometrical probes which allow valid statistical inference...... between computer science and stereology, we try to overcome these problems by developing new virtual stereological probes and virtual tissue sections. A concrete result is the development of a new virtual 3D probe, the spatial rotator, which was found to have lower variance than the widely used planar...... simulator and a memory efficient, GPU implementation of for connected components labeling. This was furthermore extended to produce signed distance fields and Voronoi diagrams, all with real-time performance. It has during the course of the project been realized that many disciplines within computer science...

  8. The engineering design integration (EDIN) system. [digital computer program complex

    Science.gov (United States)

    Glatt, C. R.; Hirsch, G. N.; Alford, G. E.; Colquitt, W. N.; Reiners, S. J.

    1974-01-01

    A digital computer program complex for the evaluation of aerospace vehicle preliminary designs is described. The system consists of a Univac 1100 series computer and peripherals using the Exec 8 operating system, a set of demand access terminals of the alphanumeric and graphics types, and a library of independent computer programs. Modification of the partial run streams, data base maintenance and construction, and control of program sequencing are provided by a data manipulation program called the DLG processor. The executive control of library program execution is performed by the Univac Exec 8 operating system through a user established run stream. A combination of demand and batch operations is employed in the evaluation of preliminary designs. Applications accomplished with the EDIN system are described.

  9. Computing, Information, and Communications Technology (CICT) Program Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The Computing, Information and Communications Technology (CICT) Program's goal is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communication technologies

  10. A computer program for analysis of fuelwood harvesting costs

    Science.gov (United States)

    George B. Harpole; Giuseppe Rensi

    1985-01-01

    The fuelwood harvesting computer program (FHP) is written in FORTRAN 60 and designed to select a collection of harvest units and systems from among alternatives to satisfy specified energy requirements at a lowest cost per million Btu's as recovered in a boiler, or thousand pounds of H2O evaporative capacity kiln drying. Computed energy costs are used as a...

  11. Gender Digital Divide and Challenges in Undergraduate Computer Science Programs

    Science.gov (United States)

    Stoilescu, Dorian; McDougall, Douglas

    2011-01-01

    Previous research revealed a reduced number of female students registered in computer science studies. In addition, the female students feel isolated, have reduced confidence, and underperform. This article explores differences between female and male students in undergraduate computer science programs in a mid-size university in Ontario. Based on…

  12. Toward Practical Secure Stable Matching

    Directory of Open Access Journals (Sweden)

    Riazi M. Sadegh

    2017-01-01

    Full Text Available The Stable Matching (SM algorithm has been deployed in many real-world scenarios including the National Residency Matching Program (NRMP and financial applications such as matching of suppliers and consumers in capital markets. Since these applications typically involve highly sensitive information such as the underlying preference lists, their current implementations rely on trusted third parties. This paper introduces the first provably secure and scalable implementation of SM based on Yao’s garbled circuit protocol and Oblivious RAM (ORAM. Our scheme can securely compute a stable match for 8k pairs four orders of magnitude faster than the previously best known method. We achieve this by introducing a compact and efficient sub-linear size circuit. We even further decrease the computation cost by three orders of magnitude by proposing a novel technique to avoid unnecessary iterations in the SM algorithm. We evaluate our implementation for several problem sizes and plan to publish it as open-source.

  13. Computer Programming with Infants and Juniors.

    Science.gov (United States)

    Hind, Jim

    1984-01-01

    The article argues that even extremely young children can be taught to program microcomputers from their very first contact. A teaching strategy is proposed, having more in common with the teaching of language than with the more traditional didactic-reinforcement cycle commonly employed in the text books. (Author/CL)

  14. Programming Languages for Distributed Computing Systems

    NARCIS (Netherlands)

    Bal, H.E.; Steiner, J.G.; Tanenbaum, A.S.

    1989-01-01

    When distributed systems first appeared, they were programmed in traditional sequential languages, usually with the addition of a few library procedures for sending and receiving messages. As distributed applications became more commonplace and more sophisticated, this ad hoc approach became less

  15. EZLP: An Interactive Computer Program for Solving Linear Programming Problems. Final Report.

    Science.gov (United States)

    Jarvis, John J.; And Others

    Designed for student use in solving linear programming problems, the interactive computer program described (EZLP) permits the student to input the linear programming model in exactly the same manner in which it would be written on paper. This report includes a brief review of the development of EZLP; narrative descriptions of program features,…

  16. From Clover to computer. Towards programmed anaesthesia?

    Science.gov (United States)

    Mapleson, W W

    1979-02-01

    The control of depth of anaesthesia has been viewed as a control-system problem the solution of which can involve both feedback and feedforward techniques. The nature of the problem in Clover's day and the solutions he found have been examined. A similar analysis has been made in respect of the modern anaesthetist. Finally, the way in which computers may aid the anaesthetist in his task has been illustrated by reference to various attempts reported from around the world and, in particular, by describing the development in Cardiff of a system which should produce, in the brain of the patient, any tension of an inhaled anaesthetic which the anaesthetist chooses to specify.

  17. 32 CFR Appendix E to Part 323 - OMB Guidelines for Matching Programs

    Science.gov (United States)

    2010-07-01

    ... of Education's defaulted student loan data base with the Office of Personnel Management's Federal... any personal identifiers. e. Matches done to support any research or statistical project when the... routine use notice in the Federal Register. The agency should also be sure to maintain an accounting of...

  18. MULGRES: a computer program for stepwise multiple regression analysis

    Science.gov (United States)

    A. Jeff Martin

    1971-01-01

    MULGRES is a computer program source deck that is designed for multiple regression analysis employing the technique of stepwise deletion in the search for most significant variables. The features of the program, along with inputs and outputs, are briefly described, with a note on machine compatibility.

  19. A Successful Course of Study in Computer Programming

    Science.gov (United States)

    Seeger, David H.

    1977-01-01

    Three keys to the successful development of the program of the computer programming department of the Technical Institute of Oklahoma State University are discussed: Community involvement, faculty/administration commitment to the basic principles of technical career education, and availability of appropriate equipment for student use. (HD)

  20. A Research Program in Computer Technology

    Science.gov (United States)

    1979-01-01

    14 (7), 1971, 453-360. 5. Donzeau-Gouge, V., G. Kahn, and B. Lang , A Complete Machine-Checked Definition of a Simple Programming Language Using...Denotational Semantics, IRIA Laborla, Technical Report 330, October 1978. 6. Donzeau-Gouge, V., G. Kahn, and B. Lang , Formal Definition of Ada, Honeywell...May 1976. r S.-..-. . . . . . . . 12. ARPANET TENEX SERVICE T’fhttiral Staff Marion McKinley, Jr. William H. Moore Robert Hines Serge Poievitzky Edward

  1. Programs=data=first-class citizens in a computational world.

    Science.gov (United States)

    Jones, Neil D; Simonsen, Jakob Grue

    2012-07-28

    From a programming perspective, Alan Turing's epochal 1936 paper on computable functions introduced several new concepts, including what is today known as self-interpreters and programs as data, and invented a great many now-common programming techniques. We begin by reviewing Turing's contribution from a programming perspective; and then systematize and mention some of the many ways that later developments in models of computation (MOCs) have interacted with computability theory and programming language research. Next, we describe the 'blob' MOC: a recent stored-program computational model without pointers. In the blob model, programs are truly first-class citizens, capable of being automatically compiled, or interpreted, or executed directly. Further, the blob model appears closer to being physically realizable than earlier computation models. In part, this is due to strong finiteness owing to early binding in the program; and a strong adjacency property: the active instruction is always adjacent to the piece of data on which it operates. The model is Turing complete in a strong sense: a universal interpretation algorithm exists that is able to run any program in a natural way and without arcane data encodings. Next, some of the best known among the numerous existing MOCs are described, and we develop a list of traits an 'ideal' MOC should possess from our perspective. We make no attempt to consider all models put forth since Turing's 1936 paper, and the selection of models covered concerns only models with discrete, atomic computation steps. The next step is to classify the selected models by qualitative rather than quantitative features. Finally, we describe how the blob model differs from an 'ideal' MOC, and identify some natural next steps to achieve such a model.

  2. Integrating computer programs for engineering analysis and design

    Science.gov (United States)

    Wilhite, A. W.; Crisp, V. K.; Johnson, S. C.

    1983-01-01

    The design of a third-generation system for integrating computer programs for engineering and design has been developed for the Aerospace Vehicle Interactive Design (AVID) system. This system consists of an engineering data management system, program interface software, a user interface, and a geometry system. A relational information system (ARIS) was developed specifically for the computer-aided engineering system. It is used for a repository of design data that are communicated between analysis programs, for a dictionary that describes these design data, for a directory that describes the analysis programs, and for other system functions. A method is described for interfacing independent analysis programs into a loosely-coupled design system. This method emphasizes an interactive extension of analysis techniques and manipulation of design data. Also, integrity mechanisms exist to maintain database correctness for multidisciplinary design tasks by an individual or a team of specialists. Finally, a prototype user interface program has been developed to aid in system utilization.

  3. A Tangible Programming Tool for Children to Cultivate Computational Thinking

    Science.gov (United States)

    Wang, Danli; Liu, Zhen

    2014-01-01

    Game and creation are activities which have good potential for computational thinking skills. In this paper we present T-Maze, an economical tangible programming tool for children aged 5–9 to build computer programs in maze games by placing wooden blocks. Through the use of computer vision technology, T-Maze provides a live programming interface with real-time graphical and voice feedback. We conducted a user study with 7 children using T-Maze to play two levels of maze-escape games and create their own mazes. The results show that T-Maze is not only easy to use, but also has the potential to help children cultivate computational thinking like abstraction, problem decomposition, and creativity. PMID:24719575

  4. On Computational Power of Quantum Read-Once Branching Programs

    Directory of Open Access Journals (Sweden)

    Farid Ablayev

    2011-03-01

    Full Text Available In this paper we review our current results concerning the computational power of quantum read-once branching programs. First of all, based on the circuit presentation of quantum branching programs and our variant of quantum fingerprinting technique, we show that any Boolean function with linear polynomial presentation can be computed by a quantum read-once branching program using a relatively small (usually logarithmic in the size of input number of qubits. Then we show that the described class of Boolean functions is closed under the polynomial projections.

  5. Home visitation program effectiveness and the influence of community behavioral norms: a propensity score matched analysis of prenatal smoking cessation

    Directory of Open Access Journals (Sweden)

    Matone Meredith

    2012-11-01

    Full Text Available Abstract Background The influence of community context on the effectiveness of evidence-based maternal and child home visitation programs following implementation is poorly understood. This study compared prenatal smoking cessation between home visitation program recipients and local-area comparison women across 24 implementation sites within one state, while also estimating the independent effect of community smoking norms on smoking cessation behavior. Methods Retrospective cohort design using propensity score matching of Nurse-Family Partnership (NFP clients and local-area matched comparison women who smoked cigarettes in the first trimester of pregnancy. Birth certificate data were used to classify smoking status. The main outcome measure was smoking cessation in the third trimester of pregnancy. Multivariable logistic regression analysis examined, over two time periods, the association of NFP exposure and the association of baseline county prenatal smoking rate on prenatal smoking cessation. Results The association of NFP participation and prenatal smoking cessation was stronger in a later implementation period (35.5% for NFP clients vs. 27.5% for comparison women, p  Conclusions Following a statewide implementation, program recipients of NFP demonstrated increased smoking cessation compared to comparison women, with a stronger program effect in later years. The significant association of county smoking rate with cessation suggests that community behavioral norms may present a challenge for evidence-based programs as models are translated into diverse communities.

  6. Injecting Artificial Memory Errors Into a Running Computer Program

    Science.gov (United States)

    Bornstein, Benjamin J.; Granat, Robert A.; Wagstaff, Kiri L.

    2008-01-01

    Single-event upsets (SEUs) or bitflips are computer memory errors caused by radiation. BITFLIPS (Basic Instrumentation Tool for Fault Localized Injection of Probabilistic SEUs) is a computer program that deliberately injects SEUs into another computer program, while the latter is running, for the purpose of evaluating the fault tolerance of that program. BITFLIPS was written as a plug-in extension of the open-source Valgrind debugging and profiling software. BITFLIPS can inject SEUs into any program that can be run on the Linux operating system, without needing to modify the program s source code. Further, if access to the original program source code is available, BITFLIPS offers fine-grained control over exactly when and which areas of memory (as specified via program variables) will be subjected to SEUs. The rate of injection of SEUs is controlled by specifying either a fault probability or a fault rate based on memory size and radiation exposure time, in units of SEUs per byte per second. BITFLIPS can also log each SEU that it injects and, if program source code is available, report the magnitude of effect of the SEU on a floating-point value or other program variable.

  7. ROTC Validation Study of LEADER MATCH IV, Programmed Instruction in Leadership for the US Army

    Science.gov (United States)

    1978-05-01

    E. Fiedler and Linda Mahar University of Washington S Seattle, Washington 98105 and -I. Robert M. Carroll . Army Research Institute •,et q•\\•’~e009ŕ...Validation Studies of Leader Match. Journal of Applied Psychology, 1978. Fiedler , F. E. A Contingency Model of Leadership Effectiveness. In L. Berkowitz...Ed.), Advances in Experimental Social Psychology (Vol. 1). New York: Academic Press, 1964. Fiedler , F. E. A Theory of Leadership Effectiveness. New

  8. 44 CFR 361.5 - Criteria for program assistance, matching contributions, and return of program assistance funds.

    Science.gov (United States)

    2010-10-01

    ... State must certify to the FEMA Regional Administrator the State will take steps to meet the 50 percent... documentation sufficient for FEMA to determine that the contribution meets the following requirements. The match... project, allocable solely thereto, and except as specifically provided herein, not be a general expense...

  9. Material Programming: a Design Practice for Computational Composites

    DEFF Research Database (Denmark)

    Vallgårda, Anna; Boer, Laurens; Tsaknaki, Vasiliki

    2016-01-01

    In this paper we propose the notion of material programming as a future design practice for computational composites. Material programming would be a way for the interaction designer to better explore the dynamic potential of computational materials at hand and through that familiarity be able...... to compose more sophisticated and complex temporal forms in their designs. The contribution of the paper is an analysis of qualities that we find a material programming practice would and should support: designs grounded in material properties and experiences, embodied programming practice, real-time on......-site explorations, and finally a reasonable level of complexity in couplings between input and output. We propose material programming knowing that the technology and materials are not entirely ready to support this practice yet, however, we are certain they will be and that the interaction design community...

  10. Web Program for Development of GUIs for Cluster Computers

    Science.gov (United States)

    Czikmantory, Akos; Cwik, Thomas; Klimeck, Gerhard; Hua, Hook; Oyafuso, Fabiano; Vinyard, Edward

    2003-01-01

    WIGLAF (a Web Interface Generator and Legacy Application Facade) is a computer program that provides a Web-based, distributed, graphical-user-interface (GUI) framework that can be adapted to any of a broad range of application programs, written in any programming language, that are executed remotely on any cluster computer system. WIGLAF enables the rapid development of a GUI for controlling and monitoring a specific application program running on the cluster and for transferring data to and from the application program. The only prerequisite for the execution of WIGLAF is a Web-browser program on a user's personal computer connected with the cluster via the Internet. WIGLAF has a client/server architecture: The server component is executed on the cluster system, where it controls the application program and serves data to the client component. The client component is an applet that runs in the Web browser. WIGLAF utilizes the Extensible Markup Language to hold all data associated with the application software, Java to enable platform-independent execution on the cluster system and the display of a GUI generator through the browser, and the Java Remote Method Invocation software package to provide simple, effective client/server networking.

  11. An introduction to NASA's advanced computing program: Integrated computing systems in advanced multichip modules

    Science.gov (United States)

    Fang, Wai-Chi; Alkalai, Leon

    1996-01-01

    Recent changes within NASA's space exploration program favor the design, implementation, and operation of low cost, lightweight, small and micro spacecraft with multiple launches per year. In order to meet the future needs of these missions with regard to the use of spacecraft microelectronics, NASA's advanced flight computing (AFC) program is currently considering industrial cooperation and advanced packaging architectures. In relation to this, the AFC program is reviewed, considering the design and implementation of NASA's AFC multichip module.

  12. Evaluation of a Novel Computer Color Matching System Based on the Improved Back-Propagation Neural Network Model.

    Science.gov (United States)

    Wei, Jiaqiang; Peng, Mengdong; Li, Qing; Wang, Yining

    2016-11-09

    To explore the feasibility of a novel computer color-matching (CCM) system based on the improved back-propagation neural network (BPNN) model by comparing it with the traditional visual method. Forty-three metal-ceramic specimens were fabricated by proportionally mixing porcelain powders. Thirty-nine specimens were randomly selected to train the BPNN model, while the remaining four specimens were used to test and calibrate the model. A CCM system based on the improved BPNN model was constructed using MATLAB software. A comparison of the novel CCM system and the traditional visual method was conducted by evaluating the color reproduction results of 10 maxillary central incisors. Metal-ceramic specimens were fabricated using two color reproduction approaches. Color distributions (L*, a*, and b*) of the target teeth and of the corresponding metal-ceramic specimens were measured using a spectroradiometer. Color differences (ΔE) and color distributions (ΔL*, Δa*, and Δb*) between the teeth and their corresponding specimens were calculated. The average ΔE value of the CCM system was 1.89 ± 0.75, which was lower than that of the visual approach (3.54 ± 1.11, p systems, except for ΔL* (p > 0.05). The novel CCM system produced greater accuracy in color reproduction within the given color space than the traditional visual approach. © 2016 by the American College of Prosthodontists.

  13. CRECTJ: a computer program for compilation of evaluated nuclear data

    Energy Technology Data Exchange (ETDEWEB)

    Nakagawa, Tsuneo [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    1999-09-01

    In order to compile evaluated nuclear data in the ENDF format, the computer program CRECTJ has been developed. CRECTJ has two versions; CRECTJ5 treats the data in the ENDF/B-IV and ENDF/B-V format, and CRECTJ6 the data in the ENDF-6 format. These programs have been frequently used to make Japanese Evaluated Nuclear Data Library (JENDL). This report describes input data and examples of CRECTJ. (author)

  14. Department of Energy Mathematical, Information, and Computational Sciences Division: High Performance Computing and Communications Program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-11-01

    This document is intended to serve two purposes. Its first purpose is that of a program status report of the considerable progress that the Department of Energy (DOE) has made since 1993, the time of the last such report (DOE/ER-0536, The DOE Program in HPCC), toward achieving the goals of the High Performance Computing and Communications (HPCC) Program. The second purpose is that of a summary report of the many research programs administered by the Mathematical, Information, and Computational Sciences (MICS) Division of the Office of Energy Research under the auspices of the HPCC Program and to provide, wherever relevant, easy access to pertinent information about MICS-Division activities via universal resource locators (URLs) on the World Wide Web (WWW).

  15. Department of Energy: MICS (Mathematical Information, and Computational Sciences Division). High performance computing and communications program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-06-01

    This document is intended to serve two purposes. Its first purpose is that of a program status report of the considerable progress that the Department of Energy (DOE) has made since 1993, the time of the last such report (DOE/ER-0536, {open_quotes}The DOE Program in HPCC{close_quotes}), toward achieving the goals of the High Performance Computing and Communications (HPCC) Program. The second purpose is that of a summary report of the many research programs administered by the Mathematical, Information, and Computational Sciences (MICS) Division of the Office of Energy Research under the auspices of the HPCC Program and to provide, wherever relevant, easy access to pertinent information about MICS-Division activities via universal resource locators (URLs) on the World Wide Web (WWW). The information pointed to by the URL is updated frequently, and the interested reader is urged to access the WWW for the latest information.

  16. Developing Singing in Third-Grade Music Classrooms: The Effect of a Concurrent-Feedback Computer Game on Pitch-Matching Skills

    Science.gov (United States)

    Paney, Andrew S.; Kay, Ann C.

    2015-01-01

    The purpose of this study was to measure the effect of concurrent visual feedback on pitch-matching skill development in third-grade students. Participants played a computer game, "SingingCoach," which scored the accuracy of their singing of the song "America." They followed the contour of the melody on the screen as the…

  17. Computer Program Plagiarism Detection: The Limits of the Halstead Metric.

    Science.gov (United States)

    Berghel, H. L.; Sallach, David L.

    1985-01-01

    Discusses two alternative metrics to detect computer software plagiarism: the Halstead metric drawn from the software science discipline and an ad hoc method drawn from program grading experience and identified by factor analysis. Possible explanations as to why the ad hoc method is more useful in identical-task environments are considered.…

  18. Computer Programming with Early Elementary Students with Down Syndrome

    Science.gov (United States)

    Taylor, Matthew S.; Vasquez, Eleazar; Donehower, Claire

    2017-01-01

    Students of all ages and abilities must be given the opportunity to learn academic skills that can shape future opportunities and careers. Researchers in the mid-1970s and 1980s began teaching young students the processes of computer programming using basic coding skills and limited technology. As technology became more personalized and easily…

  19. Computers for All Children: A Handbook for Program Design.

    Science.gov (United States)

    Sharp, Pamela; Crist-Whitzel, Janet

    One of three publications of the Research on Equitable Access to Technology (REAT) project, this practitioner's handbook is designed to assist educators in the design and implementation of computer instruction programs for underserved groups of students, including low-income, minority, low-achieving, limited-English speaking, female, and rural…

  20. Tpetra, and the Use of Generic Programming in Scientific Computing

    Directory of Open Access Journals (Sweden)

    C.G. Baker

    2012-01-01

    Full Text Available We present Tpetra, a Trilinos package for parallel linear algebra primitives implementing the Petra object model. We describe Tpetra's design, based on generic programming via C++ templated types and template metaprogramming. We discuss some benefits of this approach in the context of scientific computing, with illustrations consisting of code and notable empirical results.

  1. What's New in Software? Integrated Computer Programs and Daily Living.

    Science.gov (United States)

    Hedley, Carolyn N.

    1989-01-01

    Various kinds of electronic information media can now be integrated to plan educational programs, through use of computer videodiscs, hypercards, and hypertexts. Discussed are the components of integrative technology, including audio technology, video technology, and electronic text and graphics, and possibilities for interfacing the various…

  2. Intellectual Property Law and the Protection of Computer Programs.

    Science.gov (United States)

    Lomio, J. Paul

    1990-01-01

    Briefly reviews the laws pertaining to copyrights, patents, and trade secrets, and discusses how each of these may be applied to the protection of computer programs. The comparative merits and limitations of each category of law are discussed and recent court decisions are summarized. (CLB)

  3. Learning Computer Programming: Implementing a Fractal in a Turing Machine

    Science.gov (United States)

    Pereira, Hernane B. de B.; Zebende, Gilney F.; Moret, Marcelo A.

    2010-01-01

    It is common to start a course on computer programming logic by teaching the algorithm concept from the point of view of natural languages, but in a schematic way. In this sense we note that the students have difficulties in understanding and implementation of the problems proposed by the teacher. The main idea of this paper is to show that the…

  4. Individual Differences in Learning Computer Programming: A Social Cognitive Approach

    Science.gov (United States)

    Akar, Sacide Guzin Mazman; Altun, Arif

    2017-01-01

    The purpose of this study is to investigate and conceptualize the ranks of importance of social cognitive variables on university students' computer programming performances. Spatial ability, working memory, self-efficacy, gender, prior knowledge and the universities students attend were taken as variables to be analyzed. The study has been…

  5. A Domain-Specific Programming Language for Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Nielsen, Janus Dam; Schwartzbach, Michael Ignatieff

    2007-01-01

    We present a domain-specific programming language for Secure Multiparty Computation (SMC). Information is a resource of vital importance and considerable economic value to individuals, public administration, and private companies. This means that the confidentiality of information is crucial, but...... application development. The language is implemented in a prototype compiler that generates Java code exploiting a distributed cryptographic runtime....

  6. A Research Program in Computer Technology. 1987 Annual Technical Report

    Science.gov (United States)

    1990-07-01

    mathematical approach to computational network design," in E. E. Swartzlander (ed.), Systolic Signal Processing Systems, chapter 1, Marcel Dekker, 1987...Intention-Based Diagnosis of Novice Programming Errors, Morgan Kaufmann, Los Altos, California, 1986. 32. Johnson, W. L., and E. Soloway, " PROUST

  7. An Analysis on Distance Education Computer Programming Students' Attitudes Regarding Programming and Their Self-Efficacy for Programming

    Science.gov (United States)

    Ozyurt, Ozcan

    2015-01-01

    This study aims to analyze the attitudes of students studying computer programming through the distance education regarding programming, and their self-efficacy for programming and the relation between these two factors. The study is conducted with 104 students being thought with distance education in a university in the north region of Turkey in…

  8. Selecting electrode configurations for image-guided cochlear implant programming using template matching.

    Science.gov (United States)

    Zhang, Dongqing; Zhao, Yiyuan; Noble, Jack H; Dawant, Benoit M

    2018-04-01

    Cochlear implants (CIs) are neural prostheses that restore hearing using an electrode array implanted in the cochlea. After implantation, the CI processor is programmed by an audiologist. One factor that negatively impacts outcomes and can be addressed by programming is cross-electrode neural stimulation overlap (NSO). We have proposed a system to assist the audiologist in programming the CI that we call image-guided CI programming (IGCIP). IGCIP permits using CT images to detect NSO and recommend deactivation of a subset of electrodes to avoid NSO. We have shown that IGCIP significantly improves hearing outcomes. Most of the IGCIP steps are robustly automated but electrode configuration selection still sometimes requires manual intervention. With expertise, distance-versus-frequency curves, which are a way to visualize the spatial relationship learned from CT between the electrodes and the nerves they stimulate, can be used to select the electrode configuration. We propose an automated technique for electrode configuration selection. A comparison between this approach and one we have previously proposed shows that our method produces results that are as good as those obtained with our previous method while being generic and requiring fewer parameters.

  9. How can clinician-educator training programs be optimized to match clinician motivations and concerns?

    Directory of Open Access Journals (Sweden)

    McCullough B

    2015-01-01

    Full Text Available Brendan McCullough, Gregory E Marton, Christopher J Ramnanan Faculty of Medicine, University of Ottawa, Ottawa, ON, Canada Background: Several medical schools have implemented programs aimed at supporting clinician-educators with formal mentoring, training, and experience in undergraduate medical teaching. However, consensus program design has yet to be established, and the effectiveness of these programs in terms of producing quality clinician-educator teaching remains unclear. The goal of this study was to review the literature to identify motivations and perceived barriers to clinician-educators, which in turn will improve clinician-educator training programs to better align with clinician-educator needs and concerns. Methods: Review of medical education literature using the terms “attitudes”, “motivations”, “physicians”, “teaching”, and “undergraduate medical education” resulted in identification of key themes revealing the primary motivations and barriers involved in physicians teaching undergraduate medical students. Results: A synthesis of articles revealed that physicians are primarily motivated to teach undergraduate students for intrinsic reasons. To a lesser extent, physicians are motivated to teach for extrinsic reasons, such as rewards or recognition. The key barriers deterring physicians from teaching medical students included: decreased productivity, lack of compensation, increased length of the working day, patient concerns/ethical issues, and lack of confidence in their own ability. Conclusion: Our findings suggest that optimization of clinician-educator training programs should address, amongst other factors, time management concerns, appropriate academic recognition for teaching service, and confidence in teaching ability. Addressing these issues may increase the retention of clinicians who are active and proficient in medical education. Keywords: clinician-educators, teaching, undergraduate medical

  10. Computing Programs for Determining Traffic Flows from Roundabouts

    Science.gov (United States)

    Boroiu, A. A.; Tabacu, I.; Ene, A.; Neagu, E.; Boroiu, A.

    2017-10-01

    For modelling road traffic at the level of a road network it is necessary to specify the flows of all traffic currents at each intersection. These data can be obtained by direct measurements at the traffic light intersections, but in the case of a roundabout this is not possible directly and the literature as well as the traffic modelling software doesn’t offer ways to solve this issue. Two sets of formulas are proposed by which all traffic flows from the roundabouts with 3 or 4 arms are calculated based on the streams that can be measured. The objective of this paper is to develop computational programs to operate with these formulas. For each of the two sets of analytical relations, a computational program was developed in the Java operating language. The obtained results fully confirm the applicability of the calculation programs. The final stage for capitalizing these programs will be to make them web pages in HTML format, so that they can be accessed and used on the Internet. The achievements presented in this paper are an important step to provide a necessary tool for traffic modelling because these computational programs can be easily integrated into specialized software.

  11. Computer programs for eddy-current defect studies

    Energy Technology Data Exchange (ETDEWEB)

    Pate, J. R.; Dodd, C. V. [Oak Ridge National Lab., TN (USA)

    1990-06-01

    Several computer programs to aid in the design of eddy-current tests and probes have been written. The programs, written in Fortran, deal in various ways with the response to defects exhibited by four types of probes: the pancake probe, the reflection probe, the circumferential boreside probe, and the circumferential encircling probe. Programs are included which calculate the impedance or voltage change in a coil due to a defect, which calculate and plot the defect sensitivity factor of a coil, and which invert calculated or experimental readings to obtain the size of a defect. The theory upon which the programs are based is the Burrows point defect theory, and thus the calculations of the programs will be more accurate for small defects. 6 refs., 21 figs.

  12. Introductory Computer Programming Course Teaching Improvement Using Immersion Language, Extreme Programming, and Education Theories

    Science.gov (United States)

    Velez-Rubio, Miguel

    2013-01-01

    Teaching computer programming to freshmen students in Computer Sciences and other Information Technology areas has been identified as a complex activity. Different approaches have been studied looking for the best one that could help to improve this teaching process. A proposed approach was implemented which is based in the language immersion…

  13. Modeling of rolling element bearing mechanics. Computer program user's manual

    Science.gov (United States)

    Greenhill, Lyn M.; Merchant, David H.

    1994-10-01

    This report provides the user's manual for the Rolling Element Bearing Analysis System (REBANS) analysis code which determines the quasistatic response to external loads or displacement of three types of high-speed rolling element bearings: angular contact ball bearings, duplex angular contact ball bearings, and cylindrical roller bearings. The model includes the defects of bearing ring and support structure flexibility. It is comprised of two main programs: the Preprocessor for Bearing Analysis (PREBAN) which creates the input files for the main analysis program, and Flexibility Enhanced Rolling Element Bearing Analysis (FEREBA), the main analysis program. This report addresses input instructions for and features of the computer codes. A companion report addresses the theoretical basis for the computer codes. REBANS extends the capabilities of the SHABERTH (Shaft and Bearing Thermal Analysis) code to include race and housing flexibility, including such effects as dead band and preload springs.

  14. Portable Computer Technology (PCT) Research and Development Program Phase 2

    Science.gov (United States)

    Castillo, Michael; McGuire, Kenyon; Sorgi, Alan

    1995-01-01

    The subject of this project report, focused on: (1) Design and development of two Advanced Portable Workstation 2 (APW 2) units. These units incorporate advanced technology features such as a low power Pentium processor, a high resolution color display, National Television Standards Committee (NTSC) video handling capabilities, a Personal Computer Memory Card International Association (PCMCIA) interface, and Small Computer System Interface (SCSI) and ethernet interfaces. (2) Use these units to integrate and demonstrate advanced wireless network and portable video capabilities. (3) Qualification of the APW 2 systems for use in specific experiments aboard the Mir Space Station. A major objective of the PCT Phase 2 program was to help guide future choices in computing platforms and techniques for meeting National Aeronautics and Space Administration (NASA) mission objectives. The focus being on the development of optimal configurations of computing hardware, software applications, and network technologies for use on NASA missions.

  15. 77 FR 13388 - Treasury Inspector General for Tax Administration; Privacy Act of 1974: Computer Matching Program

    Science.gov (United States)

    2012-03-06

    .... Information Return Master File (IRMF) t. Electronic Filing Records u. CADE Individual Master File (IMF) v. CADE Business Master File (BMF) w. Audit Under-reporter Case File x. Acquired Property Records y. Lien...

  16. 75 FR 8311 - Privacy Act of 1974; Notice of a Computer Matching Program

    Science.gov (United States)

    2010-02-24

    ... Appendix I to OMB Circular No. A- 130, ``Federal Agency Responsibilities for Maintaining Records about... provides that the IG will conduct activities designed to promote economy and efficiency and to prevent and...

  17. 78 FR 73851 - Privacy Act of 1974; Notice of a Computer Matching Program

    Science.gov (United States)

    2013-12-09

    ... Management and Budget pursuant to paragraph 4d of Appendix I to OMB Circular No. A-130, ``Federal Agency... provides that the IG will conduct activities designed to promote economy and efficiency and to prevent and...

  18. New Mexico district work-effort analysis computer program

    Science.gov (United States)

    Hiss, W.L.; Trantolo, A.P.; Sparks, J.L.

    1972-01-01

    The computer program (CAN 2) described in this report is one of several related programs used in the New Mexico District cost-analysis system. The work-effort information used in these programs is accumulated and entered to the nearest hour on forms completed by each employee. Tabulating cards are punched directly from these forms after visual examinations for errors are made. Reports containing detailed work-effort data itemized by employee within each project and account and by account and project for each employee are prepared for both current-month and year-to-date periods by the CAN 2 computer program. An option allowing preparation of reports for a specified 3-month period is provided. The total number of hours worked on each account and project and a grand total of hours worked in the New Mexico District is computed and presented in a summary report for each period. Work effort not chargeable directly to individual projects or accounts is considered as overhead and can be apportioned to the individual accounts and projects on the basis of the ratio of the total hours of work effort for the individual accounts or projects to the total New Mexico District work effort at the option of the user. The hours of work performed by a particular section, such as General Investigations or Surface Water, are prorated and charged to the projects or accounts within the particular section. A number of surveillance or buffer accounts are employed to account for the hours worked on special events or on those parts of large projects or accounts that require a more detailed analysis. Any part of the New Mexico District operation can be separated and analyzed in detail by establishing an appropriate buffer account. With the exception of statements associated with word size, the computer program is written in FORTRAN IV in a relatively low and standard language level to facilitate its use on different digital computers. The program has been run only on a Control Data Corporation

  19. Solutions manual and computer programs for physical and computational aspects of convective heat transfer

    CERN Document Server

    Cebeci, Tuncer

    1989-01-01

    This book is designed to accompany Physical and Computational Aspects of Convective Heat Transfer by T Cebeci and P Bradshaw and contains solutions to the exercises and computer programs for the numerical methods contained in that book Physical and Computational Aspects of Convective Heat Transfer begins with a thorough discussion of the physical aspects of convective heat transfer and presents in some detail the partial differential equations governing the transport of thermal energy in various types of flows The book is intended for senior undergraduate and graduate students of aeronautical, chemical, civil and mechanical engineering It can also serve as a reference for the practitioner

  20. My Program Is Ok--Am I? Computing Freshmen's Experiences of Doing Programming Assignments

    Science.gov (United States)

    Kinnunen, Paivi; Simon, Beth

    2012-01-01

    This article provides insight into how computing majors experience the process of doing programming assignments in their first programming course. This grounded theory study sheds light on the various processes and contexts through which students constantly assess their self-efficacy as a programmer. The data consists of a series of four…

  1. Motivating Programming: Using Storytelling to Make Computer Programming Attractive to Middle School Girls

    Science.gov (United States)

    2006-11-01

    In Generic Alice, there are two common default Chapter 5: Developing the Storytelling Gallery 114 positions for characters and, consequently , two...balance or generating the nth Fibonacci number. Often, students write programs in introductory computer science using professional programming...handle without fundamentally changing the common control structures found in general -purpose languages. Consequently , when a student moves from one of

  2. Computer Programming Games and Gender Oriented Cultural Forms

    Science.gov (United States)

    AlSulaiman, Sarah Abdulmalik

    I present the design and evaluation of two games designed to help elementary and middle school students learn computer programming concepts. The first game was designed to be "gender neutral", aligning with might be described as a consensus opinion on best practices for computational learning environments. The second game, based on the cultural form of dress up dolls was deliberately designed to appeal to females. I recruited 70 participants in an international two-phase study to investigate the relationship between games, gender, attitudes towards computer programming, and learning. My findings suggest that while the two games were equally effective in terms of learning outcomes, I saw differences in motivation between players of the two games. Specifically, participants who reported a preference for female- oriented games were more motivated to learn about computer programming when they played a game that they perceived as designed for females. In addition, I describe how the two games seemed to encourage different types of social activity between players in a classroom setting. Based on these results, I reflect on the strategy of exclusively designing games and activities as "gender neutral", and suggest that employing cultural forms, including gendered ones, may help create a more productive experience for learners.

  3. Computer-Guided Deep Brain Stimulation Programming for Parkinson's Disease.

    Science.gov (United States)

    Heldman, Dustin A; Pulliam, Christopher L; Urrea Mendoza, Enrique; Gartner, Maureen; Giuffrida, Joseph P; Montgomery, Erwin B; Espay, Alberto J; Revilla, Fredy J

    2016-02-01

    Pilot study to evaluate computer-guided deep brain stimulation (DBS) programming designed to optimize stimulation settings using objective motion sensor-based motor assessments. Seven subjects (five males; 54-71 years) with Parkinson's disease (PD) and recently implanted DBS systems participated in this pilot study. Within two months of lead implantation, the subject returned to the clinic to undergo computer-guided programming and parameter selection. A motion sensor was placed on the index finger of the more affected hand. Software guided a monopolar survey during which monopolar stimulation on each contact was iteratively increased followed by an automated assessment of tremor and bradykinesia. After completing assessments at each setting, a software algorithm determined stimulation settings designed to minimize symptom severities, side effects, and battery usage. Optimal DBS settings were chosen based on average severity of motor symptoms measured by the motion sensor. Settings chosen by the software algorithm identified a therapeutic window and improved tremor and bradykinesia by an average of 35.7% compared with baseline in the "off" state (p computer-guided DBS programming identified stimulation parameters that significantly improved tremor and bradykinesia with minimal clinician involvement. Automated motion sensor-based mapping is worthy of further investigation and may one day serve to extend programming to populations without access to specialized DBS centers. © 2015 International Neuromodulation Society.

  4. Engineering and programming manual: Two-dimensional kinetic reference computer program (TDK)

    Science.gov (United States)

    Nickerson, G. R.; Dang, L. D.; Coats, D. E.

    1985-01-01

    The Two Dimensional Kinetics (TDK) computer program is a primary tool in applying the JANNAF liquid rocket thrust chamber performance prediction methodology. The development of a methodology that includes all aspects of rocket engine performance from analytical calculation to test measurements, that is physically accurate and consistent, and that serves as an industry and government reference is presented. Recent interest in rocket engines that operate at high expansion ratio, such as most Orbit Transfer Vehicle (OTV) engine designs, has required an extension of the analytical methods used by the TDK computer program. Thus, the version of TDK that is described in this manual is in many respects different from the 1973 version of the program. This new material reflects the new capabilities of the TDK computer program, the most important of which are described.

  5. Center for Programming Models for Scalable Parallel Computing

    Energy Technology Data Exchange (ETDEWEB)

    John Mellor-Crummey

    2008-02-29

    Rice University's achievements as part of the Center for Programming Models for Scalable Parallel Computing include: (1) design and implemention of cafc, the first multi-platform CAF compiler for distributed and shared-memory machines, (2) performance studies of the efficiency of programs written using the CAF and UPC programming models, (3) a novel technique to analyze explicitly-parallel SPMD programs that facilitates optimization, (4) design, implementation, and evaluation of new language features for CAF, including communication topologies, multi-version variables, and distributed multithreading to simplify development of high-performance codes in CAF, and (5) a synchronization strength reduction transformation for automatically replacing barrier-based synchronization with more efficient point-to-point synchronization. The prototype Co-array Fortran compiler cafc developed in this project is available as open source software from http://www.hipersoft.rice.edu/caf.

  6. Techniques for Engaging Students in an Online Computer Programming Course

    Directory of Open Access Journals (Sweden)

    Eman M. El-Sheikh

    2009-02-01

    Full Text Available Many institutions of higher education are significantly expanding their online program and course offerings to deal with the rapidly increasing demand for flexible educational alternatives. One of the main challenges that faculty who teach online courses face is determining how to engage students in an online environment. Teaching computer programming effectively requires demonstration of programming techniques, examples, and environments, and interaction with the students, making online delivery even more challenging. This paper describes efforts to engage students in an online introductory programming course at our institution. The tools and methods used to promote student engagement in the course are described, in addition to the lessons learned from the design and delivery of the online course and opportunities for future work.

  7. Final Report: Center for Programming Models for Scalable Parallel Computing

    Energy Technology Data Exchange (ETDEWEB)

    Mellor-Crummey, John [William Marsh Rice University

    2011-09-13

    As part of the Center for Programming Models for Scalable Parallel Computing, Rice University collaborated with project partners in the design, development and deployment of language, compiler, and runtime support for parallel programming models to support application development for the “leadership-class” computer systems at DOE national laboratories. Work over the course of this project has focused on the design, implementation, and evaluation of a second-generation version of Coarray Fortran. Research and development efforts of the project have focused on the CAF 2.0 language, compiler, runtime system, and supporting infrastructure. This has involved working with the teams that provide infrastructure for CAF that we rely on, implementing new language and runtime features, producing an open source compiler that enabled us to evaluate our ideas, and evaluating our design and implementation through the use of benchmarks. The report details the research, development, findings, and conclusions from this work.

  8. Qualification of a computer program for drill string dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Stone, C.M.; Carne, T.G.; Caskey, B.C.

    1985-01-01

    A four point plan for the qualification of the GEODYN drill string dynamics computer program is described. The qualification plan investigates both modal response and transient response of a short drill string subjected to simulated cutting loads applied through a polycrystalline diamond compact (PDC) bit. The experimentally based qualification shows that the analytical techniques included in Phase 1 GEODYN correctly simulate the dynamic response of the bit-drill string system. 6 refs., 8 figs.

  9. Introduction to ''Interactive models of computation and program behaviour"

    OpenAIRE

    Curien, Pierre-Louis

    2009-01-01

    Since the mid-eighties of the last century, a fruitful interplay between computer scientists and mathematicians has led to much progress in the understanding of programming languages, and has given new impulse to areas of mathematics such as proof theory or category theory. The volume of which this text is an introduction contains three contributions: Categorical semantics of linear logic, by P.-A. Melliès, Realizability in classical logic, by J.-L. Krivien, Abstract machines for dialogue gam...

  10. PET computer programs for use with the 88-inch cyclotron

    Energy Technology Data Exchange (ETDEWEB)

    Gough, R.A.; Chlosta, L.

    1981-06-01

    This report describes in detail several offline programs written for the PET computer which provide an efficient data management system to assist with the operation of the 88-Inch Cyclotron. This function includes the capability to predict settings for all cyclotron and beam line parameters for all beams within the present operating domain of the facility. The establishment of a data base for operational records is also described from which various aspects of the operating history can be projected.

  11. Designing, programming, and optimizing a (small) quantum computer

    Science.gov (United States)

    Svore, Krysta

    In 1982, Richard Feynman proposed to use a computer founded on the laws of quantum physics to simulate physical systems. In the more than thirty years since, quantum computers have shown promise to solve problems in number theory, chemistry, and materials science that would otherwise take longer than the lifetime of the universe to solve on an exascale classical machine. The practical realization of a quantum computer requires understanding and manipulating subtle quantum states while experimentally controlling quantum interference. It also requires an end-to-end software architecture for programming, optimizing, and implementing a quantum algorithm on the quantum device hardware. In this talk, we will introduce recent advances in connecting abstract theory to present-day real-world applications through software. We will highlight recent advancement of quantum algorithms and the challenges in ultimately performing a scalable solution on a quantum device.

  12. Computationally intensive econometrics using a distributed matrix-programming language.

    Science.gov (United States)

    Doornik, Jurgen A; Hendry, David F; Shephard, Neil

    2002-06-15

    This paper reviews the need for powerful computing facilities in econometrics, focusing on concrete problems which arise in financial economics and in macroeconomics. We argue that the profession is being held back by the lack of easy-to-use generic software which is able to exploit the availability of cheap clusters of distributed computers. Our response is to extend, in a number of directions, the well-known matrix-programming interpreted language Ox developed by the first author. We note three possible levels of extensions: (i) Ox with parallelization explicit in the Ox code; (ii) Ox with a parallelized run-time library; and (iii) Ox with a parallelized interpreter. This paper studies and implements the first case, emphasizing the need for deterministic computing in science. We give examples in the context of financial economics and time-series modelling.

  13. Matching user needs to technology in dementia care: experiences with the Alma Supervisor Educational Program

    Directory of Open Access Journals (Sweden)

    Torhild Holthe

    2016-12-01

    Full Text Available The number of individuals with dementia in Norway is more than 78,000, and, as in all other European countries, this figure is expected to rise over the coming decades. The Norwegian Health Directorate encourages municipalities to make use of ‘welfare technology’ in order to contribute to independent living and quality of life in older adults, to increase the quality of community health care, to save time when providing community health services and to reduce costs, e.g. admission to a nursing home. Introducing welfare technology to care recipients requires innovation on the part of the community health care service with regard to increasing the competency of the staff in the operation of the technologies, as well as in establishing an infrastructure for ‘digital communication’. Research has shown that access to assistive technology may support individuals with mild cognitive impairments, as well as in an early phase of dementia. However, it is crucial that the technology addresses an identified need, and that the device is tailored to the person’s preferences and context. Therefore, it is important to train health professionals to assess the user’s needs and preferences and to identify resources and limitations in the particular context. Alma’s House in Oslo is a demonstration site and education center for welfare technologies. The education program for the certification of Alma supervisors has become an important strategy in educating occupational therapists (OTs and nurses on how to assess user needs, identify appropriate technology and implement this into the care recipient’s home.

  14. The ACP (Advanced Computer Program) multiprocessor system at Fermilab

    Energy Technology Data Exchange (ETDEWEB)

    Nash, T.; Areti, H.; Atac, R.; Biel, J.; Case, G.; Cook, A.; Fischler, M.; Gaines, I.; Hance, R.; Husby, D.

    1986-09-01

    The Advanced Computer Program at Fermilab has developed a multiprocessor system which is easy to use and uniquely cost effective for many high energy physics problems. The system is based on single board computers which cost under $2000 each to build including 2 Mbytes of on board memory. These standard VME modules each run experiment reconstruction code in Fortran at speeds approaching that of a VAX 11/780. Two versions have been developed: one uses Motorola's 68020 32 bit microprocessor, the other runs with AT and T's 32100. both include the corresponding floating point coprocessor chip. The first system, when fully configured, uses 70 each of the two types of processors. A 53 processor system has been operated for several months with essentially no down time by computer operators in the Fermilab Computer Center, performing at nearly the capacity of 6 CDC Cyber 175 mainframe computers. The VME crates in which the processing ''nodes'' sit are connected via a high speed ''Branch Bus'' to one or more MicroVAX computers which act as hosts handling system resource management and all I/O in offline applications. An interface from Fastbus to the Branch Bus has been developed for online use which has been tested error free at 20 Mbytes/sec for 48 hours. ACP hardware modules are now available commercially. A major package of software, including a simulator that runs on any VAX, has been developed. It allows easy migration of existing programs to this multiprocessor environment. This paper describes the ACP Multiprocessor System and early experience with it at Fermilab and elsewhere.

  15. Natural Resources Research Program: Catalog of Computer Programs for Project Management.

    Science.gov (United States)

    project management . These include programs developed for use on a microcomputer, as well as those which run on a host computer but are accessed by a terminal in a field office. A one-page description of each program contains the title; preparing agency; abstract; a summary of the data inputs and outputs; equipment, disk, and memory requirements; operating system and programming language; and a contact for further information. The programs described in this publication are not limited to those available within the Corps, but also include those available from other

  16. Towards a Serious Game to Help Students Learn Computer Programming

    Directory of Open Access Journals (Sweden)

    Mathieu Muratet

    2009-01-01

    Full Text Available Video games are part of our culture like TV, movies, and books. We believe that this kind of software can be used to increase students' interest in computer science. Video games with other goals than entertainment, serious games, are present, today, in several fields such as education, government, health, defence, industry, civil security, and science. This paper presents a study around a serious game dedicated to strengthening programming skills. Real-Time Strategy, which is a popular game genre, seems to be the most suitable kind of game to support such a serious game. From programming teaching features to video game characteristics, we define a teaching organisation to experiment if a serious game can be adapted to learn programming.

  17. Evaluating a community-based early childhood education and development program in Indonesia: study protocol for a pragmatic cluster randomized controlled trial with supplementary matched control group

    NARCIS (Netherlands)

    Pradhan, M.; Brinkman, S.A.; Beatty, A.; Maika, A.; Satriawan, E.; de Ree, J.; Hasan, A.

    2013-01-01

    Background This paper presents the study protocol for a pragmatic cluster randomized controlled trial (RCT) with a supplementary matched control group. The aim of the trial is to evaluate a community-based early education and development program launched by the Government of Indonesia. The program

  18. HAL/SM language specification. [programming languages and computer programming for space shuttles

    Science.gov (United States)

    Williams, G. P. W., Jr.; Ross, C.

    1975-01-01

    A programming language is presented for the flight software of the NASA Space Shuttle program. It is intended to satisfy virtually all of the flight software requirements of the space shuttle. To achieve this, it incorporates a wide range of features, including applications-oriented data types and organizations, real time control mechanisms, and constructs for systems programming tasks. It is a higher order language designed to allow programmers, analysts, and engineers to communicate with the computer in a form approximating natural mathematical expression. Parts of the English language are combined with standard notation to provide a tool that readily encourages programming without demanding computer hardware expertise. Block diagrams and flow charts are included. The semantics of the language is discussed.

  19. CERN Computing Colloquia Spring Series: IT Security - A High-Performance Pattern Matching Engine for Intrusion Detection

    CERN Multimedia

    CERN. Geneva

    2006-01-01

    The flexible and modular design of the engine allows a broad spectrum of applications, ranging from high-end enterprise level network devices that need to match hundreds of thousands of patterns at speeds of tens of gigabits per second, to low-end dev...

  20. Participatory Assessment of a Matched Savings Program for Human Trafficking Survivors and their Family Members in the Philippines

    Directory of Open Access Journals (Sweden)

    Laura Cordisco Tsai

    2017-05-01

    Full Text Available Survivors of human trafficking often experience considerable financial difficulties upon exiting human trafficking, including pressure to provide financially for their families, challenges securing employment, lack of savings, and familial debt. Few evaluations have been conducted of reintegration support interventions addressing financial vulnerability among trafficking survivors. In this article, we present findings from a participatory assessment of the BARUG program, a matched savings and financial capability program for survivors of human trafficking and their family members in the Philippines. Photovoice was used to understand the experiences of two cohorts of BARUG participants. Survivors collaborated with research team members in conducting thematic analysis of transcripts from the photovoice sessions. Themes included: the positive emotional impact of financial wellness, overcoming the challenges of saving, applying financial management skills in daily decision making, developing a habit of savings, building a future-oriented mindset, receiving guidance and enlightenment, the learning process, and the change process. Findings reinforce the importance of interventions to support trafficked persons and their family members in getting out of debt and accumulating emergency savings, while also providing emotional support to survivors in coping with family financial pressures. The study also highlights the value of using participatory research methods to understand the experiences of trafficked persons. URN: http://nbn-resolving.de/urn:nbn:de:0114-fqs1702116

  1. [An algol program for the computation of empiric regressions].

    Science.gov (United States)

    Peil, J; Schmerling, S

    1977-01-01

    An explanation is given about the meaning of empirical regression and on the domain of application of this biomathematical-statistical procedure. It may be helpful in data handling after the measurements and in a first stage of data processing especially if there is a large amount of datas. An empirical regression can provide the basis for a functional relationship analysis by giving hints for the choice of empirical mathematical functions. This will be useful and necessary in such cases where the measured values have a greater dispersion and one wants to get an analytical expression for the course of measured points. In the appendix a program listing of the ALGOL-program for empirical regression is presented. Detailed remarks are made in the text concerning the program structure, the data input and output resp. the program control parameters to enable the biological or medical user to adapt the program to their special problems without the help by a mathematician, and neither with deeper knowledge of mathematics nor with detailed insight to computer technical aspects of data processing.

  2. New software for computer-assisted dental-data matching in Disaster Victim Identification and long-term missing persons investigations: "DAVID Web".

    Science.gov (United States)

    Clement, J G; Winship, V; Ceddia, J; Al-Amad, S; Morales, A; Hill, A J

    2006-05-15

    In 1997 an internally supported but unfunded pilot project at the Victorian Institute of Forensic Medicine (VIFM) Australia led to the development of a computer system which closely mimicked Interpol paperwork for the storage, later retrieval and tentative matching of the many AM and PM dental records that are often needed for rapid Disaster Victim Identification. The program was called "DAVID" (Disaster And Victim IDentification). It combined the skills of the VIFM Information Technology systems manager (VW), an experienced odontologist (JGC) and an expert database designer (JC); all current authors on this paper. Students did much of the writing of software to prescription from Monash University. The student group involved won an Australian Information Industry Award in recognition of the contribution the new software could have made to the DVI process. Unfortunately, the potential of the software was never realized because paradoxically the federal nature of Australia frequently thwarts uniformity of systems across the entire country. As a consequence, the final development of DAVID never took place. Given the recent problems encountered post-tsunami by the odontologists who were obliged to use the Plass Data system (Plass Data Software, Holbaek, Denmark) and with the impending risks imposed upon Victoria by the decision to host the Commonwealth Games in Melbourne during March 2006, funding was sought and obtained from the state government to update counter disaster preparedness at the VIFM. Some of these funds have been made available to upgrade and complete the DAVID project. In the wake of discussions between leading expert odontologists from around the world held in Geneva during July 2003 at the invitation of the International Committee of the Red Cross significant alterations to the initial design parameters of DAVID were proposed. This was part of broader discussions directed towards developing instruments which could be used by the ICRC's "The Missing

  3. A Computer Program for Assessing Nuclear Safety Culture Impact

    Energy Technology Data Exchange (ETDEWEB)

    Han, Kiyoon; Jae, Moosung [Hanyang Univ., Seoul (Korea, Republic of)

    2014-10-15

    Through several accidents of NPP including the Fukushima Daiichi in 2011 and Chernobyl accidents in 1986, a lack of safety culture was pointed out as one of the root cause of these accidents. Due to its latent influences on safety performance, safety culture has become an important issue in safety researches. Most of the researches describe how to evaluate the state of the safety culture of the organization. However, they did not include a possibility that the accident occurs due to the lack of safety culture. Because of that, a methodology for evaluating the impact of the safety culture on NPP's safety is required. In this study, the methodology for assessing safety culture impact is suggested and a computer program is developed for its application. SCII model which is the new methodology for assessing safety culture impact quantitatively by using PSA model. The computer program is developed for its application. This program visualizes the SCIs and the SCIIs. It might contribute to comparing the level of the safety culture among NPPs as well as improving the management safety of NPP.

  4. Frequency Domain Computer Programs for Prediction and Analysis of Rail Vehicle Dynamics : Volume 1. Technical Report

    Science.gov (United States)

    1975-12-01

    Frequency domain computer programs developed or acquired by TSC for the analysis of rail vehicle dynamics are described in two volumes. Volume I defines the general analytical capabilities required for computer programs applicable to single rail vehi...

  5. One-bit-matching theorem for ICA, convex-concave programming on polyhedral set, and distribution approximation for combinatorics.

    Science.gov (United States)

    Xu, Lei

    2007-02-01

    According to the proof by Liu, Chiu, and Xu (2004) on the so-called one-bit-matching conjecture (Xu, Cheung, and Amari, 1998a), all the sources can be separated as long as there is an one-to-one same-sign correspondence between the kurtosis signs of all source probability density functions (pdf's) and the kurtosis signs of all model pdf's, which is widely believed and implicitly supported by many empirical studies. However, this proof is made only in a weak sense that the conjecture is true when the global optimal solution of an independent component analysis criterion is reached. Thus, it cannot support the successes of many existing iterative algorithms that usually converge at one of the local optimal solutions. This article presents a new mathematical proof that is obtained in a strong sense that the conjecture is also true when any one of local optimal solutions is reached in helping to investigating convex-concave programming on a polyhedral set. Theorems are also provided not only on partial separation of sources when there is a partial matching between the kurtosis signs, but also on an interesting duality of maximization and minimization on source separation. Moreover, corollaries are obtained on an interesting duality, with supergaussian sources separated by maximization and subgaussian sources separated by minimization. Also, a corollary is obtained to confirm the symmetric orthogonalization implementation of the kurtosis extreme approach for separating multiple sources in parallel, which works empirically but lacks mathematical proof. Furthermore, a linkage has been set up to combinatorial optimization from a distribution approximation perspective and a Stiefel manifold perspective, with algorithms that guarantee convergence as well as satisfaction of constraints.

  6. Ethics of prevention: an interactive computer-tailored program.

    Science.gov (United States)

    Van Hooren, Rob H; Van den Borne, Bart W; Curfs, Leopold M G; Widdershoven, Guy A M

    2007-01-01

    This article describes the contents of an interactive computer-tailored program. The program is based on previous studies of the practice of care for persons with Prader-Willi syndrome. This genetic condition is associated with a constant overeating behaviour with the risk of obesity. The aim of the program is to start a process of awareness, reflection, and discussion by caregivers who are confronted with the moral dilemma of respect for autonomy versus restricting overeating behaviour. The program focuses on values (such as health and well-being) that are relevant to caregivers in daily practice. Furthermore, the focus is on various ways of interaction with the client. Caregivers were expected to focus mainly on health, and on both paternalistic and interpretive/deliberative forms of interaction. Sixteen professionals and 12 parents pilot-tested the program contents. With a pre-test, responses on one central case were collected for tailored feedback; with a post-test, the effects of the program were measured. Significant correlations were found between the values of autonomy and consultation and between autonomy and well-being. In contrast to our expectations respondents valued all categories (autonomy, consultation, health, well-being, and liveability for others) as equally important in the pre-test. No significant changes in scores were found between pre- and post-test. The open answers and remarks of participants support the program contents. Participants' responses support previous research findings, advocating a concept of autonomy in terms of positive freedom, through support by others. The promotion of the client's self-understanding and self-development is central in this concept.

  7. High Performance Computing - Power Application Programming Interface Specification.

    Energy Technology Data Exchange (ETDEWEB)

    Laros, James H.,; Kelly, Suzanne M.; Pedretti, Kevin; Grant, Ryan; Olivier, Stephen Lecler; Levenhagen, Michael J.; DeBonis, David

    2014-08-01

    Measuring and controlling the power and energy consumption of high performance computing systems by various components in the software stack is an active research area [13, 3, 5, 10, 4, 21, 19, 16, 7, 17, 20, 18, 11, 1, 6, 14, 12]. Implementations in lower level software layers are beginning to emerge in some production systems, which is very welcome. To be most effective, a portable interface to measurement and control features would significantly facilitate participation by all levels of the software stack. We present a proposal for a standard power Application Programming Interface (API) that endeavors to cover the entire software space, from generic hardware interfaces to the input from the computer facility manager.

  8. Building Computer-Based Experiments in Psychology without Programming Skills.

    Science.gov (United States)

    Ruisoto, Pablo; Bellido, Alberto; Ruiz, Javier; Juanes, Juan A

    2016-06-01

    Research in Psychology usually requires to build and run experiments. However, although this task has required scripting, recent computer tools based on graphical interfaces offer new opportunities in this field for researchers with non-programming skills. The purpose of this study is to illustrate and provide a comparative overview of two of the main free open source "point and click" software packages for building and running experiments in Psychology: PsychoPy and OpenSesame. Recommendations for their potential use are further discussed.

  9. Structural mode significance using INCA. [Interactive Controls Analysis computer program

    Science.gov (United States)

    Bauer, Frank H.; Downing, John P.; Thorpe, Christopher J.

    1990-01-01

    Structural finite element models are often too large to be used in the design and analysis of control systems. Model reduction techniques must be applied to reduce the structural model to manageable size. In the past, engineers either performed the model order reduction by hand or used distinct computer programs to retrieve the data, to perform the significance analysis and to reduce the order of the model. To expedite this process, the latest version of INCA has been expanded to include an interactive graphical structural mode significance and model order reduction capability.

  10. Computational Hydrodynamics: How Portable and Scalable Are Heterogeneous Programming Paradigms?

    DEFF Research Database (Denmark)

    Pawlak, Wojciech; Glimberg, Stefan Lemvig; Engsig-Karup, Allan Peter

    New many-core era applications at the interface of mathematics and computer science adopt modern parallel programming paradigms and expose parallelism through proper algorithms. We present new performance results for a novel massively parallel free surface wave model suitable for advanced......-device system sizes from desktops to large HPC systems such as superclusters and in the cloud utilizing heterogeneous devices like multi-core CPUs, GPUs, and Xeon Phi coprocessors. The numerical efficiency is evaluated on heterogeneous devices like multi-core CPUs, GPUs and Xeon Phi coprocessors to test...

  11. Using smartphone technology to monitor physical activity in the 10,000 Steps program: a matched case-control trial.

    Science.gov (United States)

    Kirwan, Morwenna; Duncan, Mitch J; Vandelanotte, Corneel; Mummery, W Kerry

    2012-04-20

    Website-delivered physical activity interventions are successful in producing short-term behavior change. However, problems with engagement and retention of participants in these programs prevent long-term behavior change. New ways of accessing online content (eg, via smartphones) may enhance engagement in these interventions, which in turn may improve the effectiveness of the programs. To measure the potential of a newly developed smartphone application to improve health behaviors in existing members of a website-delivered physical activity program (10,000 Steps, Australia). The aims of the study were to (1) examine the effect of the smartphone application on self-monitoring and self-reported physical activity levels, (2) measure the perceived usefulness and usability of the application, and (3) examine the relationship between the perceived usefulness and usability of the application and its actual use. All participants were existing members of the 10,000 Steps program. We recruited the intervention group (n = 50) via email and instructed them to install the application on their smartphone and use it for 3 months. Participants in this group were able to log their steps by using either the smartphone application or the 10,000 Steps website. Following the study, the intervention group completed an online questionnaire assessing perceived usability and usefulness of the smartphone application. We selected control group participants (n = 150), matched for age, gender, level of self-monitoring, preintervention physical activity level, and length of membership in the 10,000 Steps program, after the intervention was completed. We collected website and smartphone usage statistics during the entire intervention period. Over the study period (90 days), the intervention group logged steps on an average of 62 days, compared with 41 days in the matched group. Intervention participants used the application 71.22% (2210/3103) of the time to log their steps. Logistic regression

  12. Automatic Parallelization Tool: Classification of Program Code for Parallel Computing

    Directory of Open Access Journals (Sweden)

    Mustafa Basthikodi

    2016-04-01

    Full Text Available Performance growth of single-core processors has come to a halt in the past decade, but was re-enabled by the introduction of parallelism in processors. Multicore frameworks along with Graphical Processing Units empowered to enhance parallelism broadly. Couples of compilers are updated to developing challenges forsynchronization and threading issues. Appropriate program and algorithm classifications will have advantage to a great extent to the group of software engineers to get opportunities for effective parallelization. In present work we investigated current species for classification of algorithms, in that related work on classification is discussed along with the comparison of issues that challenges the classification. The set of algorithms are chosen which matches the structure with different issues and perform given task. We have tested these algorithms utilizing existing automatic species extraction toolsalong with Bones compiler. We have added functionalities to existing tool, providing a more detailed characterization. The contributions of our work include support for pointer arithmetic, conditional and incremental statements, user defined types, constants and mathematical functions. With this, we can retain significant data which is not captured by original speciesof algorithms. We executed new theories into the device, empowering automatic characterization of program code.

  13. Activity computer program for calculating ion irradiation activation

    Science.gov (United States)

    Palmer, Ben; Connolly, Brian; Read, Mark

    2017-07-01

    A computer program, Activity, was developed to predict the activity and gamma lines of materials irradiated with an ion beam. It uses the TENDL (Koning and Rochman, 2012) [1] proton reaction cross section database, the Stopping and Range of Ions in Matter (SRIM) (Biersack et al., 2010) code, a Nuclear Data Services (NDS) radioactive decay database (Sonzogni, 2006) [2] and an ENDF gamma decay database (Herman and Chadwick, 2006) [3]. An extended version of Bateman's equation is used to calculate the activity at time t, and this equation is solved analytically, with the option to also solve by numeric inverse Laplace Transform as a failsafe. The program outputs the expected activity and gamma lines of the activated material.

  14. Programming a massively parallel, computation universal system: static behavior

    Energy Technology Data Exchange (ETDEWEB)

    Lapedes, A.; Farber, R.

    1986-01-01

    In previous work by the authors, the ''optimum finding'' properties of Hopfield neural nets were applied to the nets themselves to create a ''neural compiler.'' This was done in such a way that the problem of programming the attractors of one neural net (called the Slave net) was expressed as an optimization problem that was in turn solved by a second neural net (the Master net). In this series of papers that approach is extended to programming nets that contain interneurons (sometimes called ''hidden neurons''), and thus deals with nets capable of universal computation. 22 refs.

  15. Accelerated Strategic Computing Initiative (ASCI) Program Plan [FY2000

    Energy Technology Data Exchange (ETDEWEB)

    None

    2000-01-01

    In August 1995, the United States took a significant step to reduce the nuclear danger. The decision to pursue a zero- yield Comprehensive Test Ban Treaty will allow greater control over the proliferation of nuclear weapons and will halt the growth of new nuclear systems. This step is only possible because of the Stockpile Stewardship Program, which provides an alternative means of ensuring the safety, performance, and reliability of the United States' enduring stockpile. At the heart of the Stockpile Stewardship Program is ASCI, which will create the high-confidence simulation capabilities needed to integrate fundamental science, experiments, and archival data into the stewardship of the actual weapons in the stockpile. ASCI will also serve to drive the development of simulation as a national resource by working closely with the computer industry and with universities.

  16. A Computer Program for a Canonical Problem in Underwater Shock

    Directory of Open Access Journals (Sweden)

    Thomas L. Geers

    1994-01-01

    Full Text Available Finite-element/boundary-element codes are widely used to analyze the response of marine structures to underwater explosions. An important step in verifying the correctness and accuracy of such codes is the comparison of code-generated results for canonical problems with corresponding analytical or semianalytical results. At the present time, such comparisons rely on hardcopy results presented in technical journals and reports. This article describes a computer program available from SAVIAC that produces user-selected numerical results for a step-wave-excited spherical shell submerged in and (optionally filled with an acoustic fluid. The method of solution employed in the program is based on classical expansion of the field quantities in generalized Fourier series in the meridional coordinate. Convergence of the series is enhanced by judicious application of modified Cesàro summation and partial closed-form solution.

  17. The Effects of a Robot Game Environment on Computer Programming Education for Elementary School Students

    Science.gov (United States)

    Shim, Jaekwoun; Kwon, Daiyoung; Lee, Wongyu

    2017-01-01

    In the past, computer programming was perceived as a task only carried out by computer scientists; in the 21st century, however, computer programming is viewed as a critical and necessary skill that everyone should learn. In order to improve teaching of problem-solving abilities in a computing environment, extensive research is being done on…

  18. Easy-to-use application programs for decay heat and delayed neutron calculations on personal computers

    Energy Technology Data Exchange (ETDEWEB)

    Oyamatsu, Kazuhiro [Nagoya Univ. (Japan)

    1998-03-01

    Application programs for personal computers are developed to calculate the decay heat power and delayed neutron activity from fission products. The main programs can be used in any computers from personal computers to main frames because their sources are written in Fortran. These programs have user friendly interfaces to be used easily not only for research activities but also for educational purposes. (author)

  19. Matching theory

    CERN Document Server

    Lovász, László

    2009-01-01

    This book surveys matching theory, with an emphasis on connections with other areas of mathematics and on the role matching theory has played, and continues to play, in the development of some of these areas. Besides basic results on the existence of matchings and on the matching structure of graphs, the impact of matching theory is discussed by providing crucial special cases and nontrivial examples on matroid theory, algorithms, and polyhedral combinatorics. The new Appendix outlines how the theory and applications of matching theory have continued to develop since the book was first publish

  20. Computer Program Recognizes Patterns in Time-Series Data

    Science.gov (United States)

    Hand, Charles

    2003-01-01

    A computer program recognizes selected patterns in time-series data like digitized samples of seismic or electrophysiological signals. The program implements an artificial neural network (ANN) and a set of N clocks for the purpose of determining whether N or more instances of a certain waveform, W, occur within a given time interval, T. The ANN must be trained to recognize W in the incoming stream of data. The first time the ANN recognizes W, it sets clock 1 to count down from T to zero; the second time it recognizes W, it sets clock 2 to count down from T to zero, and so forth through the Nth instance. On the N + 1st instance, the cycle is repeated, starting with clock 1. If any clock has not reached zero when it is reset, then N instances of W have been detected within time T, and the program so indicates. The program can readily be encoded in a field-programmable gate array or an application-specific integrated circuit that could be used, for example, to detect electroencephalographic or electrocardiographic waveforms indicative of epileptic seizures or heart attacks, respectively.

  1. Program Predicts Time Courses of Human/Computer Interactions

    Science.gov (United States)

    Vera, Alonso; Howes, Andrew

    2005-01-01

    CPM X is a computer program that predicts sequences of, and amounts of time taken by, routine actions performed by a skilled person performing a task. Unlike programs that simulate the interaction of the person with the task environment, CPM X predicts the time course of events as consequences of encoded constraints on human behavior. The constraints determine which cognitive and environmental processes can occur simultaneously and which have sequential dependencies. The input to CPM X comprises (1) a description of a task and strategy in a hierarchical description language and (2) a description of architectural constraints in the form of rules governing interactions of fundamental cognitive, perceptual, and motor operations. The output of CPM X is a Program Evaluation Review Technique (PERT) chart that presents a schedule of predicted cognitive, motor, and perceptual operators interacting with a task environment. The CPM X program allows direct, a priori prediction of skilled user performance on complex human-machine systems, providing a way to assess critical interfaces before they are deployed in mission contexts.

  2. Computing global minimizers to a constrained B-spline image registration problem from optimal l1 perturbations to block match data.

    Science.gov (United States)

    Castillo, Edward; Castillo, Richard; Fuentes, David; Guerrero, Thomas

    2014-04-01

    Block matching is a well-known strategy for estimating corresponding voxel locations between a pair of images according to an image similarity metric. Though robust to issues such as image noise and large magnitude voxel displacements, the estimated point matches are not guaranteed to be spatially accurate. However, the underlying optimization problem solved by the block matching procedure is similar in structure to the class of optimization problem associated with B-spline based registration methods. By exploiting this relationship, the authors derive a numerical method for computing a global minimizer to a constrained B-spline registration problem that incorporates the robustness of block matching with the global smoothness properties inherent to B-spline parameterization. The method reformulates the traditional B-spline registration problem as a basis pursuit problem describing the minimall1-perturbation to block match pairs required to produce a B-spline fitting error within a given tolerance. The sparsity pattern of the optimal perturbation then defines a voxel point cloud subset on which the B-spline fit is a global minimizer to a constrained variant of the B-spline registration problem. As opposed to traditional B-spline algorithms, the optimization step involving the actual image data is addressed by block matching. The performance of the method is measured in terms of spatial accuracy using ten inhale/exhale thoracic CT image pairs (available for download atwww.dir-lab.com) obtained from the COPDgene dataset and corresponding sets of expert-determined landmark point pairs. The results of the validation procedure demonstrate that the method can achieve a high spatial accuracy on a significantly complex image set. The proposed methodology is demonstrated to achieve a high spatial accuracy and is generalizable in that in can employ any displacement field parameterization described as a least squares fit to block match generated estimates. Thus, the framework

  3. Computer programs for forward and inverse modeling of acoustic and electromagnetic data

    Science.gov (United States)

    Ellefsen, Karl J.

    2011-01-01

    A suite of computer programs was developed by U.S. Geological Survey personnel for forward and inverse modeling of acoustic and electromagnetic data. This report describes the computer resources that are needed to execute the programs, the installation of the programs, the program designs, some tests of their accuracy, and some suggested improvements.

  4. Threshold evaluation data revision and computer program enhancement. Final report

    Energy Technology Data Exchange (ETDEWEB)

    1979-02-27

    The Threshold Evaluation System was developed to assist the Division of Buildings and Community Systems of the Department of Energy in performing preliminary evaluation of projects being considered for funding. In addition, the evaluation has been applied to on-going projects, because information obtained through RD and D may alter the expected benefits and costs of a project, making it necessary to reevaluate project funding. The system evaluates each project according to its expected energy savings and costs. A number of public and private sector criteria are calculated, upon which comparisons between projects may be based. A summary of the methodology is given in Appendix B. The purpose of this task is to upgrade both the quality of the data used for input to the system and the usefulness and efficiency of the computer program used to perform the analysis. The modifications required to produce a better, more consistent set of data are described in Section 2. Program changes that have had a significant impact on the methodology are discussed in Section 3, while those that affected only the computer code are presented as a system flow diagram and program listing in Appendix C. These improvements in the project evaluation methodology and data will provide BCS with a more efficient and comprehensive management tool. The direction of future work will be toward integrating this system with a large scale (at ORNL) so that information used by both systems may be stored in a common data base. A discussion of this, and other unresolved problems is given in Section 4.

  5. Frequency Domain Computer Programs for Prediction and Analysis of Rail Vehicle Dynamics : Volume 2. Appendixes

    Science.gov (United States)

    1975-12-01

    Frequency domain computer programs developed or acquired by TSC for the analysis of rail vehicle dynamics are described in two volumes. Volume 2 contains program listings including subroutines for the four TSC frequency domain programs described in V...

  6. Second Annual AEC Scientific Computer Information Exhange Meeting. Proceedings of the technical program theme: computer graphics

    Energy Technology Data Exchange (ETDEWEB)

    Peskin,A.M.; Shimamoto, Y.

    1974-01-01

    The topic of computer graphics serves well to illustrate that AEC affiliated scientific computing installations are well represented in the forefront of computing science activities. The participant response to the technical program was overwhelming--both in number of contributions and quality of the work described. Session I, entitled Advanced Systems, contains presentations describing systems that contain features not generally found in graphics facilities. These features can be roughly classified as extensions of standard two-dimensional monochromatic imaging to higher dimensions including color and time as well as multidimensional metrics. Session II presents seven diverse applications ranging from high energy physics to medicine. Session III describes a number of important developments in establishing facilities, techniques and enhancements in the computer graphics area. Although an attempt was made to schedule as many of these worthwhile presentations as possible, it appeared impossible to do so given the scheduling constraints of the meeting. A number of prospective presenters 'came to the rescue' by graciously withdrawing from the sessions. Some of their abstracts have been included in the Proceedings.

  7. Implementing a Pilot Trial of an Infection Control Program in Nursing Homes: Results of a Matched Cluster Randomized Trial.

    Science.gov (United States)

    McConeghy, Kevin W; Baier, Rosa; McGrath, Kevin P; Baer, Christof J; Mor, Vincent

    2017-08-01

    among NH residents. In our 10-facility randomized, matched pair pilot study, we observed program compliance and satisfaction along with reductions in surface bacterial counts, but did not observe a statistically significant reduction in infection rates, antimicrobial use, or hospitalizations. Published by Elsevier Inc.

  8. Multi-Language Programming Environments for High Performance Java Computing

    Directory of Open Access Journals (Sweden)

    Vladimir Getov

    1999-01-01

    Full Text Available Recent developments in processor capabilities, software tools, programming languages and programming paradigms have brought about new approaches to high performance computing. A steadfast component of this dynamic evolution has been the scientific community’s reliance on established scientific packages. As a consequence, programmers of high‐performance applications are reluctant to embrace evolving languages such as Java. This paper describes the Java‐to‐C Interface (JCI tool which provides application programmers wishing to use Java with immediate accessibility to existing scientific packages. The JCI tool also facilitates rapid development and reuse of existing code. These benefits are provided at minimal cost to the programmer. While beneficial to the programmer, the additional advantages of mixed‐language programming in terms of application performance and portability are addressed in detail within the context of this paper. In addition, we discuss how the JCI tool is complementing other ongoing projects such as IBM’s High‐Performance Compiler for Java (HPCJ and IceT’s metacomputing environment.

  9. Improved Body Mass Index Measures Following a Middle School-Based Obesity Intervention--The MATCH Program

    Science.gov (United States)

    Lazorick, Suzanne; Fang, Xiangming; Hardison, George T.; Crawford, Yancey

    2015-01-01

    Background: Motivating Adolescents with Technology to CHOOSE Health™ (MATCH) is an educational and behavioral intervention in seventh grade. Methods: Teachers in 2 schools delivered the MATCH curriculum, with 1 control school. Using a quasi-experimental design, outcome measures included lessons completed, body mass index (BMI), BMI z-score (zBMI),…

  10. The Old Brain, the New Mirror: Matching Teaching and Learning Styles in Foreign Language Class (Based on Neuro-Linguistic Programming).

    Science.gov (United States)

    Knowles, John K.

    The process of matching teaching materials and methods to the student's learning style and ability level in foreign language classes is explored. The Neuro-Linguistic Programming (NLP) model offers a diagnostic process for the identification of style. This process can be applied to the language learning setting as a way of presenting material to…

  11. KNET - DISTRIBUTED COMPUTING AND/OR DATA TRANSFER PROGRAM

    Science.gov (United States)

    Hui, J.

    1994-01-01

    KNET facilitates distributed computing between a UNIX compatible local host and a remote host which may or may not be UNIX compatible. It is capable of automatic remote login. That is, it performs on the user's behalf the chore of handling host selection, user name, and password to the designated host. Once the login has been successfully completed, the user may interactively communicate with the remote host. Data output from the remote host may be directed to the local screen, to a local file, and/or to a local process. Conversely, data input from the keyboard, a local file, or a local process may be directed to the remote host. KNET takes advantage of the multitasking and terminal mode control features of the UNIX operating system. A parent process is used as the upper layer for interfacing with the local user. A child process is used for a lower layer for interfacing with the remote host computer, and optionally one or more child processes can be used for the remote data output. Output may be directed to the screen and/or to the local processes under the control of a data pipe switch. In order for KNET to operate, the local and remote hosts must observe a common communications protocol. KNET is written in ANSI standard C-language for computers running UNIX. It has been successfully implemented on several Sun series computers and a DECstation 3100 and used to run programs remotely on VAX VMS and UNIX based computers. It requires 100K of RAM under SunOS and 120K of RAM under DEC RISC ULTRIX. An electronic copy of the documentation is provided on the distribution medium. The standard distribution medium for KNET is a .25 inch streaming magnetic tape cartridge in UNIX tar format. It is also available on a 3.5 inch diskette in UNIX tar format. KNET was developed in 1991 and is a copyrighted work with all copyright vested in NASA. UNIX is a registered trademark of AT&T Bell Laboratories. Sun and SunOS are trademarks of Sun Microsystems, Inc. DECstation, VAX, VMS, and

  12. Aether: Leveraging Linear Programming For Optimal Cloud Computing In Genomics.

    Science.gov (United States)

    Luber, Jacob M; Tierney, Braden T; Cofer, Evan M; Patel, Chirag J; Kostic, Aleksandar D

    2017-12-08

    Across biology we are seeing rapid developments in scale of data production without a corresponding increase in data analysis capabilities. Here, we present Aether (http://aether.kosticlab.org), an intuitive, easy-to-use, cost-effective, and scalable framework that uses linear programming (LP) to optimally bid on and deploy combinations of underutilized cloud computing resources. Our approach simultaneously minimizes the cost of data analysis and provides an easy transition from users' existing HPC pipelines. Data utilized are available at https://pubs.broadinstitute.org/diabimmune and with EBI SRA accession ERP005989. Source code is available at (https://github.com/kosticlab/aether). Examples, documentation, and a tutorial are available at (http://aether.kosticlab.org). chirag_patel@hms.harvard.edu and aleksandar.kostic@joslin.harvard.edu. Supplementary data are available at Bioinformatics online.

  13. Multi-domain computerized cognitive training program improves performance of bookkeeping tasks: a matched-sampling active-controlled trial.

    Science.gov (United States)

    Lampit, Amit; Ebster, Claus; Valenzuela, Michael

    2014-01-01

    Cognitive skills are important predictors of job performance, but the extent to which computerized cognitive training (CCT) can improve job performance in healthy adults is unclear. We report, for the first time, that a CCT program aimed at attention, memory, reasoning and visuo-spatial abilities can enhance productivity in healthy younger adults on bookkeeping tasks with high relevance to real-world job performance. 44 business students (77.3% female, mean age 21.4 ± 2.6 years) were assigned to either (a) 20 h of CCT, or (b) 20 h of computerized arithmetic training (active control) by a matched sampling procedure. Both interventions were conducted over a period of 6 weeks, 3-4 1-h sessions per week. Transfer of skills to performance on a 60-min paper-based bookkeeping task was measured at three time points-baseline, after 10 h and after 20 h of training. Repeated measures ANOVA found a significant Group X Time effect on productivity (F = 7.033, df = 1.745; 73.273, p = 0.003) with a significant interaction at both the 10-h (Relative Cohen's effect size = 0.38, p = 0.014) and 20-h time points (Relative Cohen's effect size = 0.40, p = 0.003). No significant effects were found on accuracy or on Conners' Continuous Performance Test, a measure of sustained attention. The results are discussed in reference to previous findings on the relationship between brain plasticity and job performance. Generalization of results requires further study.

  14. Interactive, Computer-Based Training Program for Radiological Workers

    Energy Technology Data Exchange (ETDEWEB)

    Trinoskey, P.A.; Camacho, P.I.; Wells, L.

    2000-01-18

    Lawrence Livermore National Laboratory (LLNL) is redesigning its Computer-Based Training (CBT) program for radiological workers. The redesign represents a major effort to produce a single, highly interactive and flexible CBT program that will meet the training needs of a wide range of radiological workers--from researchers and x-ray operators to individuals working in tritium, uranium, plutonium, and accelerator facilities. The new CBT program addresses the broad diversity of backgrounds found at a national laboratory. When a training audience is homogeneous in terms of education level and type of work performed, it is difficult to duplicate the effectiveness of a flexible, technically competent instructor who can tailor a course to the express needs and concerns of a course's participants. Unfortunately, such homogeneity is rare. At LLNL, they have a diverse workforce engaged in a wide range of radiological activities, from the fairly common to the quite exotic. As a result, the Laboratory must offer a wide variety of radiological worker courses. These include a general contamination-control course in addition to radioactive-material-handling courses for both low-level laboratory (i.e., bench-top) activities as well as high-level work in tritium, uranium, and plutonium facilities. They also offer training courses for employees who work with radiation-generating devices--x-ray, accelerator, and E-beam operators, for instance. However, even with the number and variety of courses the Laboratory offers, they are constrained by the diversity of backgrounds (i.e., knowledge and experience) of those to be trained. Moreover, time constraints often preclude in-depth coverage of site- and/or task-specific details. In response to this situation, several years ago LLNL began moving toward computer-based training for radiological workers. Today, that CBT effort includes a general radiological safety course developed by the Department of Energy's Hanford facility and

  15. The Julia programming language: the future of scientific computing

    Science.gov (United States)

    Gibson, John

    2017-11-01

    Julia is an innovative new open-source programming language for high-level, high-performance numerical computing. Julia combines the general-purpose breadth and extensibility of Python, the ease-of-use and numeric focus of Matlab, the speed of C and Fortran, and the metaprogramming power of Lisp. Julia uses type inference and just-in-time compilation to compile high-level user code to machine code on the fly. A rich set of numeric types and extensive numerical libraries are built-in. As a result, Julia is competitive with Matlab for interactive graphical exploration and with C and Fortran for high-performance computing. This talk interactively demonstrates Julia's numerical features and benchmarks Julia against C, C++, Fortran, Matlab, and Python on a spectral time-stepping algorithm for a 1d nonlinear partial differential equation. The Julia code is nearly as compact as Matlab and nearly as fast as Fortran. This material is based upon work supported by the National Science Foundation under Grant No. 1554149.

  16. A program for reading DNA sequence gels using a small computer equipped with a graphics tablet.

    Science.gov (United States)

    Lautenberger, J A

    1982-01-01

    A program has been written in BASIC that allows DNA sequence gels to be read by a Tektronix model 4052 computer equipped with a graphics tablet. Sequences from each gel are stored on tape for later transfer to a larger computer where they are melded into a complete overall sequence. The program should be adaptable to other small computers. PMID:7063401

  17. A Study of the Programming Languages Used in Information Systems and in Computer Science Curricula

    Science.gov (United States)

    Russell, Jack; Russell, Barbara; Pollacia, Lissa F.; Tastle, William J.

    2010-01-01

    This paper researches the computer languages taught in the first, second and third programming courses in Computer Information Systems (CIS), Management Information Systems (MIS or IS) curricula as well as in Computer Science (CS) and Information Technology (IT) curricula. Instructors teaching the first course in programming within a four year…

  18. TRECII: a computer program for transportation risk assessment

    Energy Technology Data Exchange (ETDEWEB)

    Franklin, A.L.

    1980-05-01

    A risk-based fault tree analysis method has been developed at the Pacific Northwest Laboratory (PNL) for analysis of nuclear fuel cycle operations. This methodology was developed for the Department of Energy (DOE) as a risk analysis tool for evaluating high level waste management systems. A computer package consisting of three programs was written at that time to assist in the performance of risk assessment: ACORN (draws fault trees), MFAULT (analyzes fault trees), and RAFT (calculates risk). This methodology evaluates release consequences and estimates the frequency of occurrence of these consequences. This document describes an additional risk calculating code which can be used in conjunction with two of the three codes for transportation risk assessment. TRECII modifies the definition of risk used in RAFT (prob. x release) to accommodate release consequences in terms of fatalities. Throughout this report risk shall be defined as probability times consequences (fatalities are one possible health effect consequence). This methodology has been applied to a variety of energy material transportation systems. Typically the material shipped has been radioactive, although some adaptation to fossil fuels has occurred. The approach is normally applied to truck or train transport systems with some adaptation to pipelines and aircraft. TRECII is designed to be used primarily in conjunction with MFAULT; however, with a moderate amount of effort by the user, it can be implemented independent of the risk analysis package developed at PNL. Code description and user instructions necessary for the implementation of the TRECII program are provided.

  19. Execution Models for Mapping Programs onto Distributed Memory Parallel Computers

    Science.gov (United States)

    1992-03-01

    DISTRIBUTED MEMORY PARALLEL COMPUTERS Alan Sussman Contract No. NAS1-18605 March 1992 Institute for Computer Applications in Science and Engineering NASA...MEMORY PARALLEL COMPUTERS Alan Sussman 1 Institute for Computer Applications in Science and Engineering NASA Langley Research Center Hampton, VA 23665...Computation onto Distributed Mem- ory Parallel Computers . PhD thesis, Carnegie Mellon University, September 1991. Also available as Technical Report

  20. Multithreaded transactions in scientific computing: New versions of a computer program for kinematical calculations of RHEED intensity oscillations

    Science.gov (United States)

    Brzuszek, Marcin; Daniluk, Andrzej

    2006-11-01

    Writing a concurrent program can be more difficult than writing a sequential program. Programmer needs to think about synchronisation, race conditions and shared variables. Transactions help reduce the inconvenience of using threads. A transaction is an abstraction, which allows programmers to group a sequence of actions on the program into a logical, higher-level computation unit. This paper presents multithreaded versions of the GROWTH program, which allow to calculate the layer coverages during the growth of thin epitaxial films and the corresponding RHEED intensities according to the kinematical approximation. The presented programs also contain graphical user interfaces, which enable displaying program data at run-time. New version program summaryTitles of programs:GROWTHGr, GROWTH06 Catalogue identifier:ADVL_v2_0 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVL_v2_0 Program obtainable from:CPC Program Library, Queen's University of Belfast, N. Ireland Catalogue identifier of previous version:ADVL Does the new version supersede the original program:No Computer for which the new version is designed and others on which it has been tested: Pentium-based PC Operating systems or monitors under which the new version has been tested: Windows 9x, XP, NT Programming language used:Object Pascal Memory required to execute with typical data:More than 1 MB Number of bits in a word:64 bits Number of processors used:1 No. of lines in distributed program, including test data, etc.:20 931 Number of bytes in distributed program, including test data, etc.: 1 311 268 Distribution format:tar.gz Nature of physical problem: The programs compute the RHEED intensities during the growth of thin epitaxial structures prepared using the molecular beam epitaxy (MBE). The computations are based on the use of kinematical diffraction theory [P.I. Cohen, G.S. Petrich, P.R. Pukite, G.J. Whaley, A.S. Arrott, Surf. Sci. 216 (1989) 222. [1

  1. Middle School Teachers' Perceptions of Computer-Assisted Reading Intervention Programs

    Science.gov (United States)

    Bippert, Kelli; Harmon, Janis

    2017-01-01

    Middle schools often turn to computer-assisted reading intervention programs to improve student reading. The questions guiding this study are (a) in what ways are computer-assisted reading intervention programs utilized, and (b) what are teachers' perceptions about these intervention programs? Nineteen secondary reading teachers were interviewed…

  2. Design and Curriculum Considerations for a Computer Graphics Program in the Arts.

    Science.gov (United States)

    Leeman, Ruedy W.

    This history and state-of-the-art review of computer graphics describes computer graphics programs and proposed programs at Sheridan College (Canada), the Rhode Island School of Design, the University of Oregon, Northern Illinois University, and Ohio State University. These programs are discussed in terms of their philosophy, curriculum, student…

  3. Case Study: Creation of a Degree Program in Computer Security. White Paper.

    Science.gov (United States)

    Belon, Barbara; Wright, Marie

    This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…

  4. The DOE Program in HPCC: High-Performance Computing and Communications.

    Science.gov (United States)

    Department of Energy, Washington, DC. Office of Energy Research.

    This document reports to Congress on the progress that the Department of Energy has made in 1992 toward achieving the goals of the High Performance Computing and Communications (HPCC) program. Its second purpose is to provide a picture of the many programs administered by the Office of Scientific Computing under the auspices of the HPCC program.…

  5. Children Learning Computer Programming: Experiments with Languages, Curricula and Programmable Devices. Technical Report No. 250.

    Science.gov (United States)

    Weyer, S. A.; Cannara, A. B.

    An experiment was conducted to study how children, aged 10-15 years, learn concepts relevant to computer programing and how they learn modern programing languages. The implicit educational goal was to teach thinking strategies through the medium of programing concepts and their applications. The computer languages Simper and Logo were chosen…

  6. Debugging the Program. Computer Equity Strategies for the Classroom Teacher.

    Science.gov (United States)

    Wolfe, Leslie R.; And Others

    Designed to provide classroom teachers with activities to enhance computer equity for female students, this kit is divided into four sections which present excerpts from four other publications: (1) "The Neuter Computer: Computers for Boys and Girls" (Jo Schuchat Sanders and Antonia Stone for the Computer Equity Training Project, Women's…

  7. A Financial Technology Entrepreneurship Program for Computer Science Students

    Science.gov (United States)

    Lawler, James P.; Joseph, Anthony

    2011-01-01

    Education in entrepreneurship is becoming a critical area of curricula for computer science students. Few schools of computer science have a concentration in entrepreneurship in the computing curricula. The paper presents Technology Entrepreneurship in the curricula at a leading school of computer science and information systems, in which students…

  8. A new kind of science - or a not-so-new kind of computer program?

    CERN Multimedia

    Naiditch, D

    2003-01-01

    Critical discussion of Stephen Wolfram's theory that "scientists give up their unwieldy equations and instead employ the types of computational rules used in cellular automata (CA) and related computer programs" (2 pages).

  9. Computation of vibration mode elastic-rigid and effective weight coefficients from finite-element computer program output

    Science.gov (United States)

    Levy, R.

    1991-01-01

    Post-processing algorithms are given to compute the vibratory elastic-rigid coupling matrices and the modal contributions to the rigid-body mass matrices and to the effective modal inertias and masses. Recomputation of the elastic-rigid coupling matrices for a change in origin is also described. A computational example is included. The algorithms can all be executed by using standard finite-element program eigenvalue analysis output with no changes to existing code or source programs.

  10. Possible means of legal protection for computer programs and perspectives of future development

    OpenAIRE

    Toufar, Pavel

    2008-01-01

    This theses focuses on the possible legal protection of a computer program as well as on the legal nature of computer program as an intangible asset. Both copyright protection (as a standard and worldwide accepted means of protection) and also the other possibilities, i.e. patent protection and protection based on provisions regulating an unfair competition are discussed. Each means of protection is assessed based on its usability in relation with the computer program taking the overall impac...

  11. Playable Serious Games for Studying and Programming Computational STEM and Informatics Applications of Distributed and Parallel Computer Architectures

    Science.gov (United States)

    Amenyo, John-Thones

    2012-01-01

    Carefully engineered playable games can serve as vehicles for students and practitioners to learn and explore the programming of advanced computer architectures to execute applications, such as high performance computing (HPC) and complex, inter-networked, distributed systems. The article presents families of playable games that are grounded in…

  12. Proceedings of seventh symposium on sharing of computer programs and technology in nuclear medicine, computer assisted data processing

    Energy Technology Data Exchange (ETDEWEB)

    Howard, B.Y.; McClain, W.J.; Landay, M. (comps.)

    1977-01-01

    The Council on Computers (CC) of the Society of Nuclear Medicine (SNM) annually publishes the Proceedings of its Symposium on the Sharing of Computer Programs and Technology in Nuclear Medicine. This is the seventh such volume and has been organized by topic, with the exception of the invited papers and the discussion following them. An index arranged by author and by subject is included.

  13. When technology became language: the origins of the linguistic conception of computer programming, 1950-1960.

    Science.gov (United States)

    Nofre, David; Priestley, Mark; Alberts, Gerard

    2014-01-01

    Language is one of the central metaphors around which the discipline of computer science has been built. The language metaphor entered modern computing as part of a cybernetic discourse, but during the second half of the 1950s acquired a more abstract meaning, closely related to the formal languages of logic and linguistics. The article argues that this transformation was related to the appearance of the commercial computer in the mid-1950s. Managers of computing installations and specialists on computer programming in academic computer centers, confronted with an increasing variety of machines, called for the creation of "common" or "universal languages" to enable the migration of computer code from machine to machine. Finally, the article shows how the idea of a universal language was a decisive step in the emergence of programming languages, in the recognition of computer programming as a proper field of knowledge, and eventually in the way we think of the computer.

  14. Thinking processes used by high-performing students in a computer programming task

    Directory of Open Access Journals (Sweden)

    Marietjie Havenga

    2011-07-01

    Full Text Available Computer programmers must be able to understand programming source code and write programs that execute complex tasks to solve real-world problems. This article is a trans- disciplinary study at the intersection of computer programming, education and psychology. It outlines the role of mental processes in the process of programming and indicates how successful thinking processes can support computer science students in writing correct and well-defined programs. A mixed methods approach was used to better understand the thinking activities and programming processes of participating students. Data collection involved both computer programs and students’ reflective thinking processes recorded in their journals. This enabled analysis of psychological dimensions of participants’ thinking processes and their problem-solving activities as they considered a programming problem. Findings indicate that the cognitive, reflective and psychological processes used by high-performing programmers contributed to their success in solving a complex programming problem. Based on the thinking processes of high performers, we propose a model of integrated thinking processes, which can support computer programming students. Keywords: Computer programming, education, mixed methods research, thinking processes.  Disciplines: Computer programming, education, psychology

  15. Race, Ethnicity and Ancestry in Unrelated Transplant Matching for the National Marrow Donor Program: A Comparison of Multiple Forms of Self-Identification with Genetics

    Science.gov (United States)

    Hollenbach, Jill A.; Saperstein, Aliya; Albrecht, Mark; Vierra-Green, Cynthia; Parham, Peter; Norman, Paul J.; Maiers, Martin

    2015-01-01

    We conducted a nationwide study comparing self-identification to genetic ancestry classifications in a large cohort (n = 1752) from the National Marrow Donor Program. We sought to determine how various measures of self-identification intersect with genetic ancestry, with the aim of improving matching algorithms for unrelated bone marrow transplant. Multiple dimensions of self-identification, including race/ethnicity and geographic ancestry were compared to classifications based on ancestry informative markers (AIMs), and the human leukocyte antigen (HLA) genes, which are required for transplant matching. Nearly 20% of responses were inconsistent between reporting race/ethnicity versus geographic ancestry. Despite strong concordance between AIMs and HLA, no measure of self-identification shows complete correspondence with genetic ancestry. In certain cases geographic ancestry reporting matches genetic ancestry not reflected in race/ethnicity identification, but in other cases geographic ancestries show little correspondence to genetic measures, with important differences by gender. However, when respondents assign ancestry to grandparents, we observe sub-groups of individuals with well- defined genetic ancestries, including important differences in HLA frequencies, with implications for transplant matching. While we advocate for tailored questioning to improve accuracy of ancestry ascertainment, collection of donor grandparents’ information will improve the chances of finding matches for many patients, particularly for mixed-ancestry individuals. PMID:26287376

  16. Automation and schema acquisition in learning elementary computer programming : implications for the design of practice

    NARCIS (Netherlands)

    van Merrienboer, Jeroen J.G.; van Merrienboer, J.J.G.; Paas, Fred G.W.C.

    1990-01-01

    Two complementary processes may be distinguished in learning a complex cognitive skill such as computer programming. First, automation offers task-specific procedures that may directly control programming behavior, second, schema acquisition offers cognitive structures that provide analogies in new

  17. Utility of Adding Magnetic Resonance Imaging to Computed Tomography Alone in the Evaluation of Cervical Spine Injury: A Propensity-Matched Analysis.

    Science.gov (United States)

    Schoenfeld, Andrew J; Tobert, Daniel G; Le, Hai V; Leonard, Dana A; Yau, Allan L; Rajan, Prashant; Cho, Charles H; Kang, James D; Bono, Christopher M; Harris, Mitchel B

    2018-02-01

    Adult patients who received computed tomography (CT) alone or CT-magnetic resonance imaging (MRI) for the evaluation of cervical spine injury. To evaluate the utility of CT-MRI in the diagnosis of cervical spine injury using propensity-matched techniques. The optimal evaluation (CT alone vs. CT and MRI) for patients with suspected cervical spine injury in the setting of blunt trauma remains controversial. The primary outcome was the identification of a cervical spine injury, with decision for surgery and change in management considered secondarily. A propensity score was developed based on the likelihood of receiving evaluation with CT-MRI, and this score was used to balance the cohorts and develop two groups of patients around whom there was a degree of clinical equipoise in terms of the imaging protocol. Logistic regression was used to evaluate for significant differences in injury detection in patients evaluated with CT alone as compared to those receiving CT-MRI. Between 2007 and 2014, 8060 patients were evaluated using CT and 693 with CT-MRI. Following propensity-score matching, each cohort contained 668 patients. There were no significant differences between the two groups in baseline characteristics. The odds of identifying a cervical spine injury were significantly higher in the CT-MRI group, even after adjusting for prior injury recognition on CT (odds ratios 2.6; 95% confidence interval 1.7-4.0; P < 0.001). However, only 53/668 patients (8%) in the CT-MRI group had injuries identified on MRI not previously recognized by CT. Only a minority of these patients (n = 5/668, 1%) necessitated surgical intervention. In this propensity-matched cohort, the addition of MRI to CT alone identified missed injuries at a rate of 8%. Only a minority of these were serious enough to warrant surgery. This speaks against the standard addition of MRI to CT-alone protocols in cervical spine evaluation after trauma. 3.

  18. The Application of Visual Basic Computer Programming Language to Simulate Numerical Iterations

    Directory of Open Access Journals (Sweden)

    Abdulkadir Baba HASSAN

    2006-06-01

    Full Text Available This paper examines the application of Visual Basic Computer Programming Language to Simulate Numerical Iterations, the merit of Visual Basic as a Programming Language and the difficulties faced when solving numerical iterations analytically, this research paper encourage the uses of Computer Programming methods for the execution of numerical iterations and finally fashion out and develop a reliable solution using Visual Basic package to write a program for some selected iteration problems.

  19. Added Value of Computer-aided CT Image Features for Early Lung Cancer Diagnosis with Small Pulmonary Nodules: A Matched Case-Control Study.

    Science.gov (United States)

    Huang, Peng; Park, Seyoun; Yan, Rongkai; Lee, Junghoon; Chu, Linda C; Lin, Cheng T; Hussien, Amira; Rathmell, Joshua; Thomas, Brett; Chen, Chen; Hales, Russell; Ettinger, David S; Brock, Malcolm; Hu, Ping; Fishman, Elliot K; Gabrielson, Edward; Lam, Stephen

    2018-01-01

    Purpose To test whether computer-aided diagnosis (CAD) approaches can increase the positive predictive value (PPV) and reduce the false-positive rate in lung cancer screening for small nodules compared with human reading by thoracic radiologists. Materials and Methods A matched case-control sample of low-dose computed tomography (CT) studies in 186 participants with 4-20-mm noncalcified lung nodules who underwent biopsy in the National Lung Screening Trial (NLST) was selected. Variables used for matching were age, sex, smoking status, chronic obstructive pulmonary disease status, body mass index, study year of the positive screening test, and screening results. Studies before lung biopsy were randomly split into a training set (70 cancers plus 70 benign controls) and a validation set (20 cancers plus 26 benign controls). Image features from within and outside dominant nodules were extracted. A CAD algorithm developed from the training set and a random forest classifier were applied to the validation set to predict biopsy outcomes. Receiver operating characteristic analysis was used to compare the prediction accuracy of CAD with the NLST investigator's diagnosis and readings from three experienced and board-certified thoracic radiologists who used contemporary clinical practice guidelines. Results In the validation cohort, the area under the receiver operating characteristic curve for CAD was 0.9154. By default, the sensitivity, specificity, and PPV of the NLST investigators were 1.00, 0.00, and 0.43, respectively. The sensitivity, specificity, PPV, and negative predictive value of CAD and the three radiologists' combined reading were 0.95, 0.88, 0.86, and 0.96 and 0.70, 0.69, 0.64, and 0.75, respectively. Conclusion CAD could increase PPV and reduce the false-positive rate in the early diagnosis of lung cancer. © RSNA, 2017 Online supplemental material is available for this article.

  20. Federal High Performance Computing and Communications Program. The Department of Energy Component.

    Science.gov (United States)

    Department of Energy, Washington, DC. Office of Energy Research.

    This report, profusely illustrated with color photographs and other graphics, elaborates on the Department of Energy (DOE) research program in High Performance Computing and Communications (HPCC). The DOE is one of seven agency programs within the Federal Research and Development Program working on HPCC. The DOE HPCC program emphasizes research in…

  1. Two Computer Programs for Equipment Cost Estimation and Economic Evaluation of Chemical Processes.

    Science.gov (United States)

    Kuri, Carlos J.; Corripio, Armando B.

    1984-01-01

    Describes two computer programs for use in process design courses: an easy-to-use equipment cost estimation program based on latest cost correlations available and an economic evaluation program which calculates two profitability indices. Comparisons between programed and hand-calculated results are included. (JM)

  2. Comparison of Self-Reported Data on Student Doctor Network to Objective Data of the National Resident Matching Program.

    Science.gov (United States)

    Sura, Karna; Wilson, Lynn D; Grills, Inga S

    2017-12-01

    To compare matching outcomes between self-reporting on Student Doctor Network (SDN) and objective data from the National Resident Matching Program (NRMP). Data were collected from SDN starting in the 2010 to 2011 academic year and extending to the 2015 to 2016 academic year. A total of 193 radiation oncology applicants had reported data during the period. A total of four applicants (2.1%) did not match and were excluded from the analysis. Applicants were compared with the NRMP charting outcomes of 2011, 2014, and 2016. US allopathic seniors comprised a majority of those reporting on SDN (95.2%). The majority of applicants (58.2%) self-reported in the later years between 2014 and 2016. Those reporting on SDN were more likely to be members of Alpha Omega Alpha (39.7% on SDN versus 27.5% in 2016 NRMP, 23.6% in 2014 NRMP, and 31.2% in 2011 NRMP) and had higher mean United States Medical Licensing Examination (USMLE) step 1 and step 2 scores. Of the applicants, 81% matched within their top three ranked residencies on their match list. Common themes associated with reasons for their successful match included research experience, letters of recommendation, and away rotations. Common themes associated with advice given to future applicants were the importance of research, personality, and away rotations. Self-reporting on SDN does have a bias toward more successful radiation oncology applicants compared with the objective NRMP data. However, if self-reporting increases, SDN may serve as a reasonably accurate source of information for future applicants. Copyright © 2017 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  3. DEP : a computer program for evaluating lumber drying costs and investments

    Science.gov (United States)

    Stewart Holmes; George B. Harpole; Edward Bilek

    1983-01-01

    The DEP computer program is a modified discounted cash flow computer program designed for analysis of problems involving economic analysis of wood drying processes. Wood drying processes are different from other processes because of the large amounts of working capital required to finance inventories, and because of relatively large shares of costs charged to inventory...

  4. Computer Literacy of Turkish Preservice Teachers in Different Teacher Training Programs

    Science.gov (United States)

    Ozsevgec, Tuncay

    2011-01-01

    This paper reports on an investigation into the sophomore and senior preservice teachers' computer literacy in different teacher training programs and to determine relationship between grades and the teacher training programs in terms of their computer literacy. The study used case study research methodology, and the sample consisted of 276…

  5. Computer program for distance learning of pesticide application technology

    Directory of Open Access Journals (Sweden)

    Bruno Maia

    2011-12-01

    Full Text Available Distance learning presents great potential for mitigating field problems on pesticide application technology. Thus, due to the lack of teaching material about pesticide spraying technology in the Portuguese language and the increasing availability of distance learning, this study developed and evaluated a computer program for distance learning about the theory of pesticide spraying technology using the tools of information technology. The modules comprising the course, named Pulverizar, were: (1 Basic concepts, (2 Factors that affect application, (3 Equipments, (4 Spraying nozzles, (5 Sprayer calibration, (6 Aerial application, (7 Chemigation, (8 Physical-chemical properties, (9 Formulations, (10 Adjuvants, (11 Water quality, and (12 Adequate use of pesticides. The program was made available to the public on July 1st, 2008, hosted at the web site www.pulverizar.iciag.ufu.br, and was simple, robust and practical on the complementation of traditional teaching for the education of professionals in Agricultural Sciences. Mastering pesticide spraying technology by people involved in agricultural production can be facilitated by the program Pulverizar, which was well accepted in its initial evaluation.O ensino à distância apresenta grande potencial para minorar os problemas ocorridos no campo na área de tecnologia de aplicação de agroquímicos. Dessa forma, diante da escassez de material instrucional na área de tecnologia de aplicação de agroquímicos em Português e do crescimento elevado da educação à distância, o objetivo deste trabalho foi desenvolver e avaliar um programa computacional para o ensino à distância da parte teórica de tecnologia de aplicação de agroquímicos, utilizando as ferramentas de tecnologia da informação. Os módulos que compuseram o curso, intitulado Pulverizar, foram: (1 Conceitos básicos, (2 Fatores que afetam a aplicação, (3 Equipamentos, (4 Pontas de pulverização, (5 Calibração de pulverizadores

  6. Artificial intelligence programming languages for computer aided manufacturing

    Science.gov (United States)

    Rieger, C.; Samet, H.; Rosenberg, J.

    1979-01-01

    Eight Artificial Intelligence programming languages (SAIL, LISP, MICROPLANNER, CONNIVER, MLISP, POP-2, AL, and QLISP) are presented and surveyed, with examples of their use in an automated shop environment. Control structures are compared, and distinctive features of each language are highlighted. A simple programming task is used to illustrate programs in SAIL, LISP, MICROPLANNER, and CONNIVER. The report assumes reader knowledge of programming concepts, but not necessarily of the languages surveyed.

  7. UMCP-BG and E collaboration in nuclear power engineering in the framework of DOE-Utility Nuclear Power Engineering Education Matching Grant Program

    Energy Technology Data Exchange (ETDEWEB)

    Wolfe, Lothar PhD

    2000-03-01

    The DOE-Utility Nuclear Power Engineering Education Matching Grant Program has been established to support the education of students in Nuclear Engineering Programs to maintain a knowledgeable workforce in the United States in order to keep nuclear power as a viable component in a mix of energy sources for the country. The involvement of the utility industry ensures that this grant program satisfies the needs and requirements of local nuclear energy producers and at the same time establishes a strong linkage between education and day-to-day nuclear power generation. As of 1997, seventeen pairs of university-utility partners existed. UMCP was never a member of that group of universities, but applied for the first time with a proposal to Baltimore Gas and Electric Company in January 1999 [1]. This proposal was generously granted by BG&E [2,3] in the form of a gift in the amount of $25,000 from BG&E's Corporate Contribution Program. Upon the arrival of a newly appointed Director of Administration in the Department of Materials and Nuclear Engineering, the BG&E check was deposited into the University's Maryland Foundation Fund. The receipt of the letter and the check enabled UMCP to apply for DOE's matching funds in the same amount by a proposal.

  8. HISD Magnet Evaluation: Science, Math, and Computer Enrichment Programs, 1990-91.

    Science.gov (United States)

    Kirkpatrick, Nanda D.; And Others

    Twenty-one magnet programs in the Houston Independent School District in Texas feature an enriched curriculum in science, math, and/or computers (science/math). Of these, 12 are elementary programs, 4 are middle school programs, and 5 are high school programs. In these programs, a total of 9,574 students were served during the 1990-91 school year:…

  9. The NASA Computational Fluid Dynamics (CFD) program - Building technology to solve future challenges

    Science.gov (United States)

    Richardson, Pamela F.; Dwoyer, Douglas L.; Kutler, Paul; Povinelli, Louis A.

    1993-01-01

    This paper presents the NASA Computational Fluid Dynamics program in terms of a strategic vision and goals as well as NASA's financial commitment and personnel levels. The paper also identifies the CFD program customers and the support to those customers. In addition, the paper discusses technical emphasis and direction of the program and some recent achievements. NASA's Ames, Langley, and Lewis Research Centers are the research hubs of the CFD program while the NASA Headquarters Office of Aeronautics represents and advocates the program.

  10. P300-based brain-computer interface (BCI) event-related potentials (ERPs): People with amyotrophic lateral sclerosis (ALS) vs. age-matched controls.

    Science.gov (United States)

    McCane, Lynn M; Heckman, Susan M; McFarland, Dennis J; Townsend, George; Mak, Joseph N; Sellers, Eric W; Zeitlin, Debra; Tenteromano, Laura M; Wolpaw, Jonathan R; Vaughan, Theresa M

    2015-11-01

    Brain-computer interfaces (BCIs) aimed at restoring communication to people with severe neuromuscular disabilities often use event-related potentials (ERPs) in scalp-recorded EEG activity. Up to the present, most research and development in this area has been done in the laboratory with young healthy control subjects. In order to facilitate the development of BCI most useful to people with disabilities, the present study set out to: (1) determine whether people with amyotrophic lateral sclerosis (ALS) and healthy, age-matched volunteers (HVs) differ in the speed and accuracy of their ERP-based BCI use; (2) compare the ERP characteristics of these two groups; and (3) identify ERP-related factors that might enable improvement in BCI performance for people with disabilities. Sixteen EEG channels were recorded while people with ALS or healthy age-matched volunteers (HVs) used a P300-based BCI. The subjects with ALS had little or no remaining useful motor control (mean ALS Functional Rating Scale-Revised 9.4 (±9.5SD) (range 0-25)). Each subject attended to a target item as the items in a 6×6 visual matrix flashed. The BCI used a stepwise linear discriminant function (SWLDA) to determine the item the user wished to select (i.e., the target item). Offline analyses assessed the latencies, amplitudes, and locations of ERPs to the target and non-target items for people with ALS and age-matched control subjects. BCI accuracy and communication rate did not differ significantly between ALS users and HVs. Although ERP morphology was similar for the two groups, their target ERPs differed significantly in the location and amplitude of the late positivity (P300), the amplitude of the early negativity (N200), and the latency of the late negativity (LN). The differences in target ERP components between people with ALS and age-matched HVs are consistent with the growing recognition that ALS may affect cortical function. The development of BCIs for use by this population may begin

  11. The New Rule Paradigm Shift: Transforming At-Risk Programs by Matching Business Archetypes Strategies in the Global Market

    Science.gov (United States)

    Stark, Paul S.

    2007-01-01

    The challenge was given to transform aviation-related programs to keep them from being eliminated. These programs were to be discontinued due to enrollment declines, costs, legislative mandates, lack of administrative support, and drastic state budget reductions. The New Rule was a paradigm shift of focus to the global market for program…

  12. Factors Influencing Women's Attitudes towards Computers in a Computer Literacy Training Program

    Science.gov (United States)

    Chang, Sung-Lu; Shieh, Ruey S.; Liu, Eric Zhi-Feng; Yu, Pao-Ta

    2012-01-01

    In the "Digital Divide" research, adult women have generally been found to be the weakest group when compared with others. There is thus a need to provide this particular group with computer literacy training, and to give them opportunities to learn about using computers. In such training, women not only need to learn computer skills,…

  13. Addition of flexible body option to the TOLA computer program. Part 2: User and programmer documentation

    Science.gov (United States)

    Dick, J. W.; Benda, B. J.

    1975-01-01

    User and programmer oriented documentation for the flexible body option of the Takeoff and Landing Analysis (TOLA) computer program are provided. The user information provides sufficient knowledge of the development and use of the option to enable the engineering user to successfully operate the modified program and understand the results. The programmer's information describes the option structure and logic enabling a programmer to make major revisions to this part of the TOLA computer program.

  14. Factorized Graph Matching.

    Science.gov (United States)

    Zhou, Feng; de la Torre, Fernando

    2015-11-19

    Graph matching (GM) is a fundamental problem in computer science, and it plays a central role to solve correspondence problems in computer vision. GM problems that incorporate pairwise constraints can be formulated as a quadratic assignment problem (QAP). Although widely used, solving the correspondence problem through GM has two main limitations: (1) the QAP is NP-hard and difficult to approximate; (2) GM algorithms do not incorporate geometric constraints between nodes that are natural in computer vision problems. To address aforementioned problems, this paper proposes factorized graph matching (FGM). FGM factorizes the large pairwise affinity matrix into smaller matrices that encode the local structure of each graph and the pairwise affinity between edges. Four are the benefits that follow from this factorization: (1) There is no need to compute the costly (in space and time) pairwise affinity matrix; (2) The factorization allows the use of a path-following optimization algorithm, that leads to improved optimization strategies and matching performance; (3) Given the factorization, it becomes straight-forward to incorporate geometric transformations (rigid and non-rigid) to the GM problem. (4) Using a matrix formulation for the GM problem and the factorization, it is easy to reveal commonalities and differences between different GM methods. The factorization also provides a clean connection with other matching algorithms such as iterative closest point; Experimental results on synthetic and real databases illustrate how FGM outperforms state-of-the-art algorithms for GM. The code is available at http://humansensing.cs.cmu.edu/fgm.

  15. Programming language, natural language? Supporting the diverse computational activities of novice programmers

    OpenAIRE

    Good, Judith; Howland, Kate

    2017-01-01

    Given the current focus on teaching computational concepts to all from an early age, combined with the growing trend to empower end users to become producers of technology rather than mere consumers, we consider the issue of “computational notation”. Specifically, where the goal is to help individuals develop their understanding of computation and/or use computation in real world settings, we question whether natural language might be a preferred notation to traditional programming languages,...

  16. FREQFIT: Computer program which performs numerical regression and statistical chi-squared goodness of fit analysis

    Energy Technology Data Exchange (ETDEWEB)

    Hofland, G.S.; Barton, C.C.

    1990-10-01

    The computer program FREQFIT is designed to perform regression and statistical chi-squared goodness of fit analysis on one-dimensional or two-dimensional data. The program features an interactive user dialogue, numerous help messages, an option for screen or line printer output, and the flexibility to use practically any commercially available graphics package to create plots of the program`s results. FREQFIT is written in Microsoft QuickBASIC, for IBM-PC compatible computers. A listing of the QuickBASIC source code for the FREQFIT program, a user manual, and sample input data, output, and plots are included. 6 refs., 1 fig.

  17. [Computer program for medical records of patients with diabetic retinopathy].

    Science.gov (United States)

    Davidescu, Livia; Ignat, Florica; Popescu, G L

    2005-01-01

    The purpose of this study was to point out the advantages or the computerised evidence in patients with diabetic retinopathy examined in "Diabetic Eye Department" from Ophthalmology Clinic Craiova. This program represents a new national performance regarding the evidence of the diabetic patients clinic examination. The main characteristics of our program are the accessibility and the coherence; the utility of this program has been demonstrated by long term use and the big number of patents recorded.

  18. Data systems and computer science: Software Engineering Program

    Science.gov (United States)

    Zygielbaum, Arthur I.

    1991-01-01

    An external review of the Integrated Technology Plan for the Civil Space Program is presented. This review is specifically concerned with the Software Engineering Program. The goals of the Software Engineering Program are as follows: (1) improve NASA's ability to manage development, operation, and maintenance of complex software systems; (2) decrease NASA's cost and risk in engineering complex software systems; and (3) provide technology to assure safety and reliability of software in mission critical applications.

  19. Programmer's guide for the GNAT computer program (numerical analysis of stratification in supercritical oxygen)

    Science.gov (United States)

    Heinmiller, J. P.

    1971-01-01

    This document is the programmer's guide for the GNAT computer program developed under MSC/TRW Task 705-2, Apollo cryogenic storage system analysis, subtask 2, is reported. Detailed logic flow charts and compiled program listings are provided for all program elements.

  20. Generic Mathematical Programming Formulation and Solution for Computer-Aided Molecular Design

    DEFF Research Database (Denmark)

    Zhang, Lei; Cignitti, Stefano; Gani, Rafiqul

    2015-01-01

    This short communication presents a generic mathematical programming formulation for Computer-Aided Molecular Design (CAMD). A given CAMD problem, based on target properties, is formulated as a Mixed Integer Linear/Non-Linear Program (MILP/MINLP). The mathematical programming model presented here...

  1. Regression Computer Programs for Setwise Regression and Three Related Analysis of Variance Techniques.

    Science.gov (United States)

    Williams, John D.; Lindem, Alfred C.

    Four computer programs using the general purpose multiple linear regression program have been developed. Setwise regression analysis is a stepwise procedure for sets of variables; there will be as many steps as there are sets. Covarmlt allows a solution to the analysis of covariance design with multiple covariates. A third program has three…

  2. Comparison of Image reformation Using Personal Computer with Dentascan Program

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Eun Kyung [Dept of OMF Radiology, School of Dentistry, Dankook University, Yongin (Korea, Republic of)

    1997-02-15

    This study was performed to demonstrate the method of image reformation of dental implants, using a personal computer with inexpensive software and to compare the images reformatted using the above method with those using Dentascan software. CT axial slices of 5 mandibles of 5 volunteers from GE Highspeed Advantage (GE Medical systems, U.S.A.) were used, Personal computer used for image reformation was PowerWave 604/120 (Power Computing Co, U.S.A.) and software used were Osiris (Univ. Hospital Of Geneva, Switzerland) and Import ACCESS V1.1(Designed Access Co., U.S.A.) for importing CT image and NIH Image 1.58 (NIH, U.S.A.) for image processing. Seven images were selected among the serial reconstructed cross-sectional images produced by Dentascan (DS group). Seven resliced cross-sectional images at the same position were obtained ned at the personal computer (PC group). Regression analysis of the measurements of PC group was done against those of DS group. Measurements of the bone height and width at the reformed cross-sectional images using Mac-compatible computer were highly correlated with those using workstation with Dentascan software (height : r2=0.999, p<0.001, width : p=0.991, p<0.001). So, it is considered that we can use a personal computer with inexpensive software for the dental implant planning, instead of the expensive software and workstation.

  3. Quantum computer simulation using the CUDA programming model

    Science.gov (United States)

    Gutiérrez, Eladio; Romero, Sergio; Trenas, María A.; Zapata, Emilio L.

    2010-02-01

    Quantum computing emerges as a field that captures a great theoretical interest. Its simulation represents a problem with high memory and computational requirements which makes advisable the use of parallel platforms. In this work we deal with the simulation of an ideal quantum computer on the Compute Unified Device Architecture (CUDA), as such a problem can benefit from the high computational capacities of Graphics Processing Units (GPU). After all, modern GPUs are becoming very powerful computational architectures which is causing a growing interest in their application for general purpose. CUDA provides an execution model oriented towards a more general exploitation of the GPU allowing to use it as a massively parallel SIMT (Single-Instruction Multiple-Thread) multiprocessor. A simulator that takes into account memory reference locality issues is proposed, showing that the challenge of achieving a high performance depends strongly on the explicit exploitation of memory hierarchy. Several strategies have been experimentally evaluated obtaining good performance results in comparison with conventional platforms.

  4. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview In autumn the main focus was to process and handle CRAFT data and to perform the Summer08 MC production. The operational aspects were well covered by regular Computing Shifts, experts on duty and Computing Run Coordination. At the Computing Resource Board (CRB) in October a model to account for service work at Tier 2s was approved. The computing resources for 2009 were reviewed for presentation at the C-RRB. The quarterly resource monitoring is continuing. Facilities/Infrastructure operations Operations during CRAFT data taking ran fine. This proved to be a very valuable experience for T0 workflows and operations. The transfers of custodial data to most T1s went smoothly. A first round of reprocessing started at the Tier-1 centers end of November; it will take about two weeks. The Computing Shifts procedure was tested full scale during this period and proved to be very efficient: 30 Computing Shifts Persons (CSP) and 10 Computing Resources Coordinators (CRC). The shift program for the shut down w...

  5. DORCA 2 computer program. Volume 2: Programmer's manual

    Science.gov (United States)

    Gold, B. J.

    1972-01-01

    A guide for coding the Dynamic Operational Requirements and Cost Analysis Program (DORCA 2) is presented. The manual provides a detailed operation of every subroutine, the layout in core of the major matrices and arrays, and the meaning of all program values. Flow charts are included.

  6. General purpose computer program for interacting supersonic configurations: Programmer's manual

    Science.gov (United States)

    Crill, W.; Dale, B.

    1977-01-01

    The program ISCON (Interacting Supersonic Configuration) is described. The program is in support of the problem to generate a numerical procedure for determining the unsteady dynamic forces on interacting wings and tails in supersonic flow. Subroutines are presented along with the complete FORTRAN source listing.

  7. SSME structural computer program development: BOPACE programmer manual

    Science.gov (United States)

    1975-01-01

    The programming manual for the two-dimensional Boeing Plastic Analysis Capability for Engines (BOPACE) program written in FORTRAN IV is presented. The BOPACE flow logic is summarized along with subroutines and input/output files. Emphasis is placed on linear equation solver routines written as an independent package.

  8. Review of the Fusion Theory and Computing Program. Fusion Energy Sciences Advisory Committee (FESAC)

    Energy Technology Data Exchange (ETDEWEB)

    Antonsen, Thomas M. [Univ. of Maryland, College Park, MD (United States); Berry, Lee A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Brown, Michael R. [Swarthmore College, PA (United States); Dahlburg, Jill P. [General Atomics, San Diego, CA (United States); Davidson, Ronald C. [Princeton Plasma Physics Lab. (PPPL), Princeton, NJ (United States); Greenwald, Martin [Massachusetts Inst. of Technology (MIT), Cambridge, MA (United States); Hegna, Chris C. [Univ. of Wisconsin, Madison, WI (United States); McCurdy, William [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Newman, David E. [Univ. of Alaska, Fairbanks, AK (United States); Pellegrini, Claudio [Univ. of California, Los Angeles, CA (United States); Phillips, Cynthia K. [Princeton Plasma Physics Lab. (PPPL), Princeton, NJ (United States); Post, Douglass E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rosenbluth, Marshall N. [Univ. of California, San Diego, CA (United States); Sheffield, John [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Simonen, Thomas C. [Munising, MI (United States); Van Dam, James [Univ. of Texas, Austin, TX (United States)

    2001-08-01

    At the November 14-15, 2000, meeting of the Fusion Energy Sciences Advisory Committee, a Panel was set up to address questions about the Theory and Computing program, posed in a charge from the Office of Fusion Energy Sciences (see Appendix A). This area was of theory and computing/simulations had been considered in the FESAC Knoxville meeting of 1999 and in the deliberations of the Integrated Program Planning Activity (IPPA) in 2000. A National Research Council committee provided a detailed review of the scientific quality of the fusion energy sciences program, including theory and computing, in 2000.

  9. Method for Statically Checking an Object-oriented Computer Program Module

    Science.gov (United States)

    Bierhoff, Kevin M. (Inventor); Aldrich, Jonathan (Inventor)

    2012-01-01

    A method for statically checking an object-oriented computer program module includes the step of identifying objects within a computer program module, at least one of the objects having a plurality of references thereto, possibly from multiple clients. A discipline of permissions is imposed on the objects identified within the computer program module. The permissions enable tracking, from among a discrete set of changeable states, a subset of states each object might be in. A determination is made regarding whether the imposed permissions are violated by a potential reference to any of the identified objects. The results of the determination are output to a user.

  10. Approaches for Stereo Matching

    Directory of Open Access Journals (Sweden)

    Takouhi Ozanian

    1995-04-01

    Full Text Available This review focuses on the last decade's development of the computational stereopsis for recovering three-dimensional information. The main components of the stereo analysis are exposed: image acquisition and camera modeling, feature selection, feature matching and disparity interpretation. A brief survey is given of the well known feature selection approaches and the estimation parameters for this selection are mentioned. The difficulties in identifying correspondent locations in the two images are explained. Methods as to how effectively to constrain the search for correct solution of the correspondence problem are discussed, as are strategies for the whole matching process. Reasons for the occurrence of matching errors are considered. Some recently proposed approaches, employing new ideas in the modeling of stereo matching in terms of energy minimization, are described. Acknowledging the importance of computation time for real-time applications, special attention is paid to parallelism as a way to achieve the required level of performance. The development of trinocular stereo analysis as an alternative to the conventional binocular one, is described. Finally a classification based on the test images for verification of the stereo matching algorithms, is supplied.

  11. Liquid rocket combustion computer model with distributed energy release. DER computer program documentation and user's guide, volume 1

    Science.gov (United States)

    Combs, L. P.

    1974-01-01

    A computer program for analyzing rocket engine performance was developed. The program is concerned with the formation, distribution, flow, and combustion of liquid sprays and combustion product gases in conventional rocket combustion chambers. The capabilities of the program to determine the combustion characteristics of the rocket engine are described. Sample data code sheets show the correct sequence and formats for variable values and include notes concerning options to bypass the input of certain data. A seperate list defines the variables and indicates their required dimensions.

  12. Unsolicited Reporting to Prescribers of Opioid Analgesics by a State Prescription Drug Monitoring Program: An Observational Study with Matched Comparison Group.

    Science.gov (United States)

    Young, Leonard D; Kreiner, Peter W; Panas, Lee

    2017-04-04

     State prescription drug monitoring programs (PDMPs) can help detect individuals with multiple provider episodes (MPEs; also referred to as doctor/pharmacy shopping), an indicator of prescription drug abuse and/or diversion. Although unsolicited reporting by PDMPs to prescribers of opioid analgesics is thought to be an important practice in reducing MPEs and the potential harm associated with them, evidence of its effectiveness is mixed. This exploratory research evaluates the impact of unsolicited reports sent by Massachusetts' PDMP to the prescribers of persons with MPEs.  Individuals with MPEs were identified from PDMP records between January 2010 and July 2011 as individuals having Schedule II prescriptions (at least one prescription being an opioid) from four or more distinct prescribers and four or more distinct pharmacies within six months. Based on available MA-PDMP resources, an unsolicited report containing the patient's 12-month prescription history was sent to prescribers of a subset of patients who met the MPE threshold; a comparison group closely matched on demographics and baseline prescription history, whose prescribers were not sent a report, was generated using propensity score matching. The prescription history of each group was examined for 12 months before and after the intervention.  There were eighty-four patients (intervention group) whose prescribers received an unsolicited report and 504 matched patients (comparison group) whose prescribers were not sent a report. Regression analyses indicated significantly greater decreases in the number of Schedule II opioid prescriptions ( P  opioid analgesics from multiple providers.

  13. Relative attractiveness of diagnostic radiology: assessment with data from the National Residency Matching Program and comparison with the strength of the job market.

    Science.gov (United States)

    Anzilotti, K; Kamin, D S; Sunshine, J H; Forman, H P

    2001-10-01

    To quantify medical students' preferences for various specialties and to compare shifts in specialty preference with overall employment market prospects. By using National Residency Matching Program data, a previously validated help-wanted index (HWI), and American Medical Association (AMA) salary data, the authors quantified medical students' preferences for various specialties and examined the association of shifts in specialty preference with overall trends as seen in the strength of the diagnostic radiology match and its relationship with the job market. The authors established a proxy for the relative attractiveness (RA) of diagnostic radiology (relative to all specialties) in the match, which was calculated by subtracting the percentage fill rate for all specialties from that for radiology. The RA values were plotted for 1990-2000 and compared with trends in the HWI, American College of Radiology data, and AMA salary data. The RA of diagnostic radiology varied greatly during the past 10 years, with a low in 1996 and a return to its high in recent years. There is a relationship between the RA and economic vitality of diagnostic radiology, with the RA lagging behind the HWI and AMA salary data by 2 years. Medical students appear to have an in-depth understanding of the economic forces at play in the health care job market and incorporate this information into their choice of a specialty.

  14. Computer Programming: An Activity as Compelling as Game Play

    Directory of Open Access Journals (Sweden)

    Tom Goulding

    2010-04-01

    Full Text Available Game motif programming exercises (GM-Games were developed to help novices develop complex client server game systems within their freshman year. GM-Games foster a strong work ethic in as much as they reproduce the challenges and excitement associated with game play; yet their purpose is the development of advanced programming skills. We have found that young people are just as interested in mastering programming skills as they are in mastering the shooting, racing or strategy skills required in many entertainment games. We describe in this paper how GM-Games imitate many of the aspects of game play.

  15. Computer Science and Perl Programming Best of Perl Journal

    CERN Document Server

    2002-01-01

    With more than a million dedicated programmers, Perl has proven to be the best computing language for the latest trends in computing and business. While other languages have stagnated, Perl remains fresh, thanks to its community-based development model, which encourages the sharing of information among users. This tradition of knowledge-sharing allows developers to find answers to almost any Perl question they can dream up.And you can find many of those answers right here in Perl Hacks. Like all books in O'Reilly's Hacks Series, Perl Hacks appeals to a variety of programmers, whether you're a

  16. Computer program for machine design of Cassegrain feed systems

    Science.gov (United States)

    Potter, P. D.

    1968-01-01

    Program designs the feed system geometry and the subreflector surface, with the main reflector configuration and frequency of operation as input data. Although the feedhorn is not designed, its required gain, beamwidth, and approximate radiation pattern are specified.

  17. GEODYN programmer's guide, volume 2, part 2. [computer program for estimation of orbit and geodetic parameters

    Science.gov (United States)

    Mullins, N. E.; Dao, N. C.; Martin, T. V.; Goad, C. C.; Boulware, N. L.; Chin, M. M.

    1972-01-01

    A computer program for executive control routine for orbit integration of artificial satellites is presented. At the beginning of each arc, the program initiates required constants as well as the variational partials at epoch. If epoch needs to be reset to a previous time, the program negates the stepsize, and calls for integration backward to the desired time. After backward integration is completed, the program resets the stepsize to the proper positive quantity.

  18. Conceptual Understanding of Computer Program Execution: Application to C++

    OpenAIRE

    Al-Fedaghi, Sabah

    2013-01-01

    A visual programming language uses pictorial tools such as diagrams to represent its structural units and control stream. It is useful for enhancing understanding, maintenance, verification, testing, and parallelism. This paper proposes a diagrammatic methodology that produces a conceptual representation of instructions for programming source codes. Without loss of generality in the potential for using the methodology in a wider range of applications, this paper focuses on using these diagram...

  19. Verifying the Absence of Common Runtime Errors in Computer Programs

    Science.gov (United States)

    1981-06-01

    the langauge designer another way to test a design, in addition to the usual ways based on experience with other languages and difficulty of...simplified verification conditions is a special skill that one must learn in order to use the verifier. In theI process of analyzing a VC, une notes...Discovery of Linear Restraints Among Variables of a Program, Proceedings of the Fifth ACM Symposium on Principles of Programming Languages, January

  20. Effects of a School-Based Social-Emotional and Character Development Program on Health Behaviors: A Matched-Pair, Cluster-Randomized Controlled Trial.

    Science.gov (United States)

    Bavarian, Niloofar; Lewis, Kendra M; Acock, Alan; DuBois, David L; Yan, Zi; Vuchinich, Samuel; Silverthorn, Naida; Day, Joseph; Flay, Brian R

    2016-02-01

    There is considerable research that suggests that school-based social-emotional programs can foster improved mental health and reduce problem behaviors for participating youth; in contrast, much less is known about the impact of these programs on physical health, even though some of these programs also include at least limited direct attention to promoting physical health behaviors. We examined the effects of one such program, Positive Action (PA), on physical health behaviors and body mass index (BMI), and tested for mediation of program effects through a measure of social-emotional and character development (SECD). Participating schools in the matched-pair, cluster-randomized trial were 14 low-performing K-8 Chicago Public Schools. We followed a cohort of students in each school from grades 3 to 8 (eight waves of data collection; 1170 total students). Student self-reports of health behaviors served as the basis for measures of healthy eating and exercise, unhealthy eating, personal hygiene, consistent bedtime, and SECD. We collected height and weight measurements at endpoint to calculate age- and gender-adjusted BMI z-scores. Longitudinal multilevel modeling analyses revealed evidence of favorable program effects on personal hygiene [effect size (ES) = 0.48], healthy eating and exercise (ES = 0.21), and unhealthy eating (ES = -0.19); in addition, BMI z-scores were lower among students in PA schools at endpoint (ES = -0.21). Program effects were not moderated by either gender or student mobility. Longitudinal structural equation modeling demonstrated mediation through SECD for healthy eating and exercise, unhealthy eating, and personal hygiene. Findings suggest that a SECD program without a primary focus on health behavior promotion can have a modest impact on outcomes in this domain during the childhood to adolescence transition.

  1. Computation of Program Source Code Similarity by Composition of Parse Tree and Call Graph

    Directory of Open Access Journals (Sweden)

    Hyun-Je Song

    2015-01-01

    Full Text Available This paper proposes a novel method to compute how similar two program source codes are. Since a program source code is represented as a structural form, the proposed method adopts convolution kernel functions as a similarity measure. Actually, a program source code has two kinds of structural information. One is syntactic information and the other is the dependencies of function calls lying on the program. Since the syntactic information of a program is expressed as its parse tree, the syntactic similarity between two programs is computed by a parse tree kernel. The function calls within a program provide a global structure of a program and can be represented as a graph. Therefore, the similarity of function calls is computed with a graph kernel. Then, both structural similarities are reflected simultaneously into comparing program source codes by composing the parse tree and the graph kernels based on a cyclomatic complexity. According to the experimental results on a real data set for program plagiarism detection, the proposed method is proved to be effective in capturing the similarity between programs. The experiments show that the plagiarized pairs of programs are found correctly and thoroughly by the proposed method.

  2. Encouraging more women into computer science: Initiating a single-sex intervention program in Sweden

    Science.gov (United States)

    Brandell, Gerd; Carlsson, Svante; Ekblom, Håkan; Nord, Ann-Charlotte

    1997-11-01

    The process of starting a new program in computer science and engineering, heavily based on applied mathematics and only open to women, is described in this paper. The program was introduced into an educational system without any tradition in single-sex education. Important observations made during the process included the considerable interest in mathematics and curiosity about computer science found among female students at the secondary school level, and the acceptance of the single-sex program by the staff, administration, and management of the university as well as among male and female students. The process described highlights the importance of preparing the environment for a totally new type of educational program.

  3. DB90: A Fortran Callable Relational Database Routine for Scientific and Engineering Computer Programs

    Science.gov (United States)

    Wrenn, Gregory A.

    2005-01-01

    This report describes a database routine called DB90 which is intended for use with scientific and engineering computer programs. The software is written in the Fortran 90/95 programming language standard with file input and output routines written in the C programming language. These routines should be completely portable to any computing platform and operating system that has Fortran 90/95 and C compilers. DB90 allows a program to supply relation names and up to 5 integer key values to uniquely identify each record of each relation. This permits the user to select records or retrieve data in any desired order.

  4. The Design of an Undergraduate Degree Program in Computer & Digital Forensics

    Directory of Open Access Journals (Sweden)

    Gary C. Kessler

    2006-09-01

    Full Text Available Champlain College formally started an undergraduate degree program in Computer & Digital Forensics in 2003. The underlying goals were that the program be multidisciplinary, bringing together the law, computer technology, and the basics of digital investigations; would be available as on online and on-campus offering; and would have a process-oriented focus. Success of this program has largely been due to working closely with practitioners, maintaining activity in events related to both industry and academia, and flexibility to respond to ever-changing needs. This paper provides an overview of how this program was conceived, developed, and implemented; its evolution over time; and current and planned initiatives.

  5. Computer Programming in the UK Undergraduate Mathematics Curriculum

    Science.gov (United States)

    Sangwin, Christopher J.; O'Toole, Claire

    2017-01-01

    This paper reports a study which investigated the extent to which undergraduate mathematics students in the United Kingdom are currently taught to programme a computer as a core part of their mathematics degree programme. We undertook an online survey, with significant follow-up correspondence, to gather data on current curricula and received…

  6. development of a computer program for the design of auger

    African Journals Online (AJOL)

    User

    Computer Science Department, U.N.N.. E- mail: ugwuishiwubo@yahoo.co.uk. ABSTRACT. The screw or auger conveyor is an important conveyor in agricultural and food processing industries. The classical approach to its analysis and design involve the determination of the type and dimensions of the pitch, capacity, screw ...

  7. A Research Program in Computer Technology. Volume 1

    Science.gov (United States)

    1981-08-01

    Kahn, and Bernard Lang . Formal Definition of Ada, Honeywell, Inc. and CII-Honeywell Bull, 1980. 2. Ichbiah, Jean D., et al., Reference Manual for the...14. COMPUTER RESEARCH SUPPORT Technical Staff: Support Staff: Dan Lynch John Metzger Walt Edmison Ray Bates Bill Moore Chloe HoIg Dale Chase Serge

  8. High Performance Computing Modernization Program Kerberos Throughput Test Report

    Science.gov (United States)

    2017-10-26

    ORGANIZATION REPORT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 10. SPONSOR / MONITOR’S ACRONYM(S)9. SPONSORING / MONITORING AGENCY...the high computing power of the main supercomputer. Each supercomputer is different in node architecture as well as hardware specifications. 2

  9. Computer Adaptive Testing for Small Scale Programs and Instructional Systems

    Science.gov (United States)

    Rudner, Lawrence M.; Guo, Fanmin

    2011-01-01

    This study investigates measurement decision theory (MDT) as an underlying model for computer adaptive testing when the goal is to classify examinees into one of a finite number of groups. The first analysis compares MDT with a popular item response theory model and finds little difference in terms of the percentage of correct classifications. The…

  10. SU-E-I-74: Image-Matching Technique of Computed Tomography Images for Personal Identification: A Preliminary Study Using Anthropomorphic Chest Phantoms

    Energy Technology Data Exchange (ETDEWEB)

    Matsunobu, Y; Shiotsuki, K [Department of Health Sciences, Graduate School of Medical Sciences, Kyushu University, Fukuoka (Japan); Morishita, J [Department of Health Sciences, Faculty of Medical Sciences, Kyushu University, Fukuoka, JP (Japan)

    2015-06-15

    Purpose: Fingerprints, dental impressions, and DNA are used to identify unidentified bodies in forensic medicine. Cranial Computed tomography (CT) images and/or dental radiographs are also used for identification. Radiological identification is important, particularly in the absence of comparative fingerprints, dental impressions, and DNA samples. The development of an automated radiological identification system for unidentified bodies is desirable. We investigated the potential usefulness of bone structure for matching chest CT images. Methods: CT images of three anthropomorphic chest phantoms were obtained on different days in various settings. One of the phantoms was assumed to be an unidentified body. The bone image and the bone image with soft tissue (BST image) were extracted from the CT images. To examine the usefulness of the bone image and/or the BST image, the similarities between the two-dimensional (2D) or threedimensional (3D) images of the same and different phantoms were evaluated in terms of the normalized cross-correlation value (NCC). Results: For the 2D and 3D BST images, the NCCs obtained from the same phantom assumed to be an unidentified body (2D, 0.99; 3D, 0.93) were higher than those for the different phantoms (2D, 0.95 and 0.91; 3D, 0.89 and 0.80). The NCCs for the same phantom (2D, 0.95; 3D, 0.88) were greater compared to those of the different phantoms (2D, 0.61 and 0.25; 3D, 0.23 and 0.10) for the bone image. The difference in the NCCs between the same and different phantoms tended to be larger for the bone images than for the BST images. These findings suggest that the image-matching technique is more useful when utilizing the bone image than when utilizing the BST image to identify different people. Conclusion: This preliminary study indicated that evaluating the similarity of bone structure in 2D and 3D images is potentially useful for identifying of an unidentified body.

  11. Workshop on programming languages for high performance computing (HPCWPL): final report.

    Energy Technology Data Exchange (ETDEWEB)

    Murphy, Richard C.

    2007-05-01

    This report summarizes the deliberations and conclusions of the Workshop on Programming Languages for High Performance Computing (HPCWPL) held at the Sandia CSRI facility in Albuquerque, NM on December 12-13, 2006.

  12. Intraobserver and intermethod reliability for using two different computer programs in preoperative lower limb alignment analysis

    Directory of Open Access Journals (Sweden)

    Mohamed Kenawey

    2016-12-01

    Conclusion: Computer assisted lower limb alignment analysis is reliable whether using graphics editing program or specialized planning software. However slight higher variability for angles away from the knee joint can be expected.

  13. Gender and stereotypes in motivation to study computer programming for careers in multimedia

    Science.gov (United States)

    Doubé, Wendy; Lang, Catherine

    2012-03-01

    A multimedia university programme with relatively equal numbers of male and female students in elective programming subjects provided a rare opportunity to investigate female motivation to study and pursue computer programming in a career. The MSLQ was used to survey 85 participants. In common with research into deterrence of females from STEM domains, females displayed significantly lower self-efficacy and expectancy for success. In contrast to research into deterrence of females from STEM domains, both genders placed similar high values on computer programming and shared high extrinsic and intrinsic goal orientation. The authors propose that the stereotype associated with a creative multimedia career could attract female participation in computer programming whereas the stereotype associated with computer science could be a deterrent.

  14. A Teaching Exercise for the Identification of Bacteria Using An Interactive Computer Program.

    Science.gov (United States)

    Bryant, Trevor N.; Smith, John E.

    1979-01-01

    Describes an interactive Fortran computer program which provides an exercise in the identification of bacteria. Provides a way of enhancing a student's approach to systematic bacteriology and numerical identification procedures. (Author/MA)

  15. COMPARING SEARCHING AND SORTING ALGORITHMS EFFICIENCY IN IMPLEMENTING COMPUTATIONAL EXPERIMENT IN PROGRAMMING ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    R. Sagan

    2011-11-01

    Full Text Available This article considers different aspects which allow defining correctness of choosing sorting algorithms. Also some algorithms, needed for computational experiments for certain class of programs, are compared.

  16. The Use of Computer-Based Programming Environments as Computer Modelling Tools in Early Science Education: The Cases of Textual and Graphical Program Languages

    Science.gov (United States)

    Louca, Loucas T.; Zacharia, Zacharia C.

    2008-01-01

    This is an interpretive case study seeking to develop detailed and comparative descriptions of how two groups of fifth-grade students used two different Computer-based Programming Environments (CPEs) (namely Microworlds Logo and Stagecast Creator) during scientific modelling. The primary sources of data that were used in this 4-month study include…

  17. THE BLENDED LEARNING ACCOMPLISHMENT OF COMPUTER AND NETWORK ENGINEERING EXPERTISE PROGRAM IN VOCATIONAL SCHOOLS

    OpenAIRE

    Aries Alfian Prasetyo; Setiadi Cahyono Putro; I Made Wirawan

    2016-01-01

    This study aims to (1) describe supporting and inhibiting factors in blended learning implementation for the students of computer and network engineering expertise program and (2) describe the accomplishment level of the implementation. This study is designed as a descriptive study with quantitative approach. The research object is the blended learning implementation in computer and network engineering expertise program in SMK N 1 Baureno Bojonegoro. The research subjects consist of teachers,...

  18. Computer-based Programs in Speech Therapy of Dyslalia and Dyslexia- Dysgraphia

    Directory of Open Access Journals (Sweden)

    Mirela Danubianu

    2010-04-01

    Full Text Available During the last years, the researchers and therapists in speech therapy have been more and more concerned with the elaboration and use of computer programs in speech disorders therapy. The main objective of this study was to evaluate the therapeutic effectiveness of computer-based programs for the Romanian language in speech therapy. Along the study, we will present the experimental research through assessing the effectiveness of computer programs in the speech therapy for speech disorders: dyslalia, dyslexia and dysgraphia. Methodologically, the use of the computer in the therapeutic phases was carried out with the help of some computer-based programs (Logomon, Dislex-Test etc. that we elaborated and we experimented with during several years of therapeutic activity. The sample used in our experiments was composed of 120 subjects; two groups of 60 children with speech disorders were selected for both speech disorders: 30 for the experimental ('computer-based' group and 30 for the control ('classical method' group. The study hypotheses verified whether the results, obtained by the subjects within the experimental group, improved significantly after using the computer-based program, compared to the subjects within the control group, who did not use this program but got a classical therapy. The hypotheses were confirmed for the speech disorders included in this research; the conclusions of the study confirm the advantages of using computer-based programs within speech therapy by correcting these disorders, as well as due to the positive influence these programs have on the development of children’s personality.

  19. US Medical Schools' Awareness of Their Students Who Smoke, Cessation Programs Available, and the Potential Impact on Residency Match.

    Science.gov (United States)

    Chidiac, Joseph E; Mohamed, Ahmed; Krishnamoorthy, Madhumitha; Mahmoud, Karim; Al-Darwash, Yassir; Rajasekaranrathnakumar, Geethapriya; Palla, Mohan; Levine, Diane L

    2017-12-13

    Hospital systems are adopting strict nicotine-free policies excluding hiring individuals who smoke, including residents for graduate medical training. This study was conducted to (1) determine medical schools' awareness of these policies, (2) awareness of their students' smoking behaviors, and (3) the smoking cessation programs that they provide. A survey was developed to learn about the smoking policies of medical schools in the United States: how school leadership estimates smoking prevalence among their students, what those estimates are, and what programs are in place to help students quit smoking. Questions were asked about awareness of policies restricting hiring smokers including applicants for residency training. Opinions were solicited on including smoking status in medical school applications. The online survey was sent to the Deans of student affairs at US medical schools. Of the 160 schools invited to participate, 84 (53%) responded. Most medical schools (92%) are smoke-free and 97% have policies specifically prohibiting tobacco use on campus. Estimates of student smoking prevalence varied from 0% to 34% with a mean of 6%. More than half of schools (52%) had no smoking-cessation programs to help students. Despite recent trends in policies that prohibit smokers from being hired into residency training programs, only 22% were aware of such policies. There were no statistically significant differences by school size, location or category (allopathic, osteopathic, public or private). Medical schools need to be aware of new hiring policies and take steps to identify and help their students quit smoking to ensure all students can secure residency training upon graduation. This study draws attention to recent policies that preclude hiring medical students who smoke for post graduate (residency) training. Our study demonstrates a lack of appreciation of these policies by medical school administration in the United States. Our study also provides information on

  20. VNAP2: a computer program for computation of two-dimensional, time-dependent, compressible, turbulent flow

    Energy Technology Data Exchange (ETDEWEB)

    Cline, M.C.

    1981-08-01

    VNAP2 is a computer program for calculating turbulent (as well as laminar and inviscid), steady, and unsteady flow. VNAP2 solves the two-dimensional, time-dependent, compressible Navier-Stokes equations. The turbulence is modeled with either an algebraic mixing-length model, a one-equation model, or the Jones-Launder two-equation model. The geometry may be a single- or a dual-flowing stream. The interior grid points are computed using the unsplit MacCormack scheme. Two options to speed up the calculations for high Reynolds number flows are included. The boundary grid points are computed using a reference-plane-characteristic scheme with the viscous terms treated as source functions. An explicit artificial viscosity is included for shock computations. The fluid is assumed to be a perfect gas. The flow boundaries may be arbitrary curved solid walls, inflow/outflow boundaries, or free-jet envelopes. Typical problems that can be solved concern nozzles, inlets, jet-powered afterbodies, airfoils, and free-jet expansions. The accuracy and efficiency of the program are shown by calculations of several inviscid and turbulent flows. The program and its use are described completely, and six sample cases and a code listing are included.

  1. A two-dimensional graphing program for the Tektronix 4050-series graphics computers

    Science.gov (United States)

    Kipp, K.L.

    1983-01-01

    A refined, two-dimensional graph-plotting program was developed for use on Tektronix 4050-series graphics computers. Important features of this program include: any combination of logarithmic and linear axes, optional automatic scaling and numbering of the axes, multiple-curve plots, character or drawn symbol-point plotting, optional cartridge-tape data input and plot-format storage, optional spline fitting for smooth curves, and built-in data-editing options. The program is run while the Tektronix is not connected to any large auxiliary computer, although data from files on an auxiliary computer easily can be transferred to data-cartridge for later plotting. The user is led through the plot-construction process by a series of questions and requests for data input. Five example plots are presented to illustrate program capability and the sequence of program operation. (USGS)

  2. CMX: The Effects of an Educational MMORPG on Learning and Teaching Computer Programming

    Science.gov (United States)

    Malliarakis, Christos; Satratzemi, Maya; Xinogalos, Stelios

    2017-01-01

    Computer programming has for decades posed several difficulties for students of all educational levels. A number of teaching approaches have been proposed over the years but none seems to fulfil the needs of students nowadays. Students use computers mainly for playing games and the Internet and as quite a few researchers state this aspect of…

  3. Computer Literacy and Online Learning Attitude toward GSOE Students in Distance Education Programs

    Science.gov (United States)

    Li, Lung-Yu; Lee, Long-Yuan

    2016-01-01

    The purpose of this study was to explore graduate students' competencies in computer use and their attitudes toward online learning in asynchronous online courses of distance learning programs in a Graduate School of Education (GSOE) in Taiwan. The research examined the relationship between computer literacy and the online learning attitudes of…

  4. Abstracts of computer programs and data libraries pertaining to photon production data

    Energy Technology Data Exchange (ETDEWEB)

    White, J.E.; Manneschmidt, J.B.; Finch, S.Y.; Dickens, J.K.

    1998-06-01

    Abstracts, or descriptions, of computer programs and data libraries pertaining to Photon Production Data (Measurements, Evaluations and Calculations) maintained in the collections of the Radiation Safety Information Computational Center, Oak Ridge, Tennessee USA and at the OECD/NEA Data Bank, Paris, are collected in this document.

  5. General design methodology applied to the research domain of physical programming for computer illiterate

    CSIR Research Space (South Africa)

    Smith, Andrew C

    2011-09-01

    Full Text Available The authors discuss the application of the 'general design methodology‘ in the context of a physical computing project. The aim of the project was to design and develop physical objects that could serve as metaphors for computer programming elements...

  6. Enhancing Student Writing and Computer Programming with LATEX and MATLAB in Multivariable Calculus

    Science.gov (United States)

    Sullivan, Eric; Melvin, Timothy

    2016-01-01

    Written communication and computer programming are foundational components of an undergraduate degree in the mathematical sciences. All lower-division mathematics courses at our institution are paired with computer-based writing, coding, and problem-solving activities. In multivariable calculus we utilize MATLAB and LATEX to have students explore…

  7. Community Needs Assessment for an Electronics and Computer Engineering Technology Program at Maui, Molokai, and Lanai.

    Science.gov (United States)

    Pezzoli, Jean A.

    In June 1992, Maui Community College (MCC), in Hawaii, conducted a survey of the communities of Maui, Molokai, Lanai, and Hana to determine perceived needs for an associate degree and certificate program in electronics and computer engineering. Questionnaires were mailed to 500 firms utilizing electronic or computer services, seeking information…

  8. Why zombies cannot write significant source code: The Knowledge Game and the art of computer programming

    NARCIS (Netherlands)

    Gobbo, F.; Benini, M.

    2015-01-01

    This article analyses the knowledge needed to understand a computer program within the philosophy of information. L. Floridi's method of levels of abstraction is applied to the relation between an ideal programmer and a modern computer seen together as an informational organism. The results obtained

  9. Permitted decompilation of a computer program in order to protect the general interest

    Directory of Open Access Journals (Sweden)

    Radovanović Sanja M.

    2015-01-01

    Full Text Available Computer program is an intellectual creation protected by copyright. However, unlike other items with equivalent legal protection, a computer program has a strong technical functionality, which is, in nowadays' society, an indispensable factor in everyday business activities, exchange of information, entertainment or achieving other similar purposes. Precisely because of this feature, computer program can rarely be seen in isolation from the hardware and software environment. In other words, the functionality of a computer program reaches its full scope only in interaction with other computer program or device. Bearing in mind the fact that this intellectual creation is in the focus of technological, and thus social, development, legislators are trying to provide a legal framework in which these interactions take place unhindered. In fact, considering that each aspect of the use of a computer program presents the exclusive right of the author, relying on his or her consent to undertake certain perpetration which would provide the necessary connectivity of the various components, could put in risk further technological development. Therefore, the lawmakers provide that, in certain cases and under certain conditions, the author's exclusive right could be restricted or excluded. This paper aims to analyze a normative contribution in achieving, technical and technological needed, and therefore, in terms of general interest justified, interactions.

  10. Demand side management scheme in smart grid with cloud computing approach using stochastic dynamic programming

    Directory of Open Access Journals (Sweden)

    S. Sofana Reka

    2016-09-01

    Full Text Available This paper proposes a cloud computing framework in smart grid environment by creating small integrated energy hub supporting real time computing for handling huge storage of data. A stochastic programming approach model is developed with cloud computing scheme for effective demand side management (DSM in smart grid. Simulation results are obtained using GUI interface and Gurobi optimizer in Matlab in order to reduce the electricity demand by creating energy networks in a smart hub approach.

  11. Certainty in Stockpile Computing: Recommending a Verification and Validation Program for Scientific Software

    Energy Technology Data Exchange (ETDEWEB)

    Lee, J.R.

    1998-11-01

    As computing assumes a more central role in managing the nuclear stockpile, the consequences of an erroneous computer simulation could be severe. Computational failures are common in other endeavors and have caused project failures, significant economic loss, and loss of life. This report examines the causes of software failure and proposes steps to mitigate them. A formal verification and validation program for scientific software is recommended and described.

  12. Evaluation of SHABERTH: A bearing simulation computer program

    Science.gov (United States)

    1978-01-01

    To investigate lubrication effects on bearing thermal performance, an investigation was performed to determine the feasibility of using the SKF program SHABERTH for simulating the performance of cryogenically lubricated ball bearings. As a part of this study, the particular application chosen for SHABERTH was to simulate the performance of the Space Shuttle main engine turbo-pump and pre-burner bearing system.

  13. A computer program for the estimation of time of death

    DEFF Research Database (Denmark)

    Lynnerup, N

    1993-01-01

    and that the temperature at death is known. Also, Marshall and Hoare's formula expresses the temperature as a function of time, and not vice versa, the latter being the problem most often encountered by forensic scientists. A simple BASIC program that enables solving of Marshall and Hoare's equation for the postmortem...

  14. 76 FR 71417 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Law Enforcement Agencies (LEA...

    Science.gov (United States)

    2011-11-17

    ... Jurisdiction who are (1) Fugitive felons, parole violators, or probation violators, as defined by the Social... felons, parole violators, or probation violators in its records originating from various databases. The... (regardless of the actual sentence imposed), and to an individual who violates a condition of probation or...

  15. 75 FR 43579 - Privacy Act of 1974; Computer Matching Program Between the Office of Personnel Management and...

    Science.gov (United States)

    2010-07-26

    ... Governmental Affairs of the Senate, the Committee on Oversight and Government Reform of the House of.... Street, NW., Washington, DC 20415. FOR FURTHER INFORMATION CONTACT: James Sparrow on (202) 606-1803...

  16. A Research Program in Computer Technology. 1983 Annual Technical Report

    Science.gov (United States)

    1984-07-01

    has been made in porting the MOSIS geometry software to the VAX 11/750. MOSIS is on the verge of generating MEBES files on the VAX 11/750. In recent...pilot tests, the MEBES files generated vn a VAX 11/750 were identical to those generated on a KL-2060. Computing on VAX 11/750s has several benefits...used primarily for geometry crunching. preparing MEBES files, and writing MEBES tapes. The MOSIS software provides for placement and routing of parts

  17. Pre-university training in computer science and office programming

    Directory of Open Access Journals (Sweden)

    Александр Иванович Громов

    2010-03-01

    Full Text Available Some features of the teaching of ICT in terms of building plans and learning objectives, to be the forefront in preparing students for the preparatory phase (in secondary and higher schools which brings mass teaching of computer science at an early stage to a qualitatively new level in accordance with modern requirements both in terms of national and international aspects are discussed in the article. The materials of the article are the basis for further development of modern EMC in accordance with the trends and the spirit of the time.

  18. Algebraic Functions, Computer Programming, and the Challenge of Transfer

    OpenAIRE

    Schanzer, Emmanuel Tanenbaum

    2015-01-01

    Students' struggles with algebra are well documented. Prior to the introduction of functions, mathematics is typically focused on applying a set of arithmetic operations to compute an answer. The introduction of functions, however, marks the point at which mathematics begins to focus on building up abstractions as a way to solve complex problems. A common refrain about word problems is that “the equations are easy to solve - the hard part is setting them up!” A student of algebra is asked to ...

  19. A program to compute the area of an irregular polygon on a spheroidal surface

    Digital Repository Service at National Institute of Oceanography (India)

    Sivakholundu, K.M.; Prabaharan, N.

    stream_size 10201 stream_content_type text/plain stream_name Comput_Geosci_24_823.pdf.txt stream_source_info Comput_Geosci_24_823.pdf.txt Content-Encoding UTF-8 Content-Type text/plain; charset=UTF-8 SHORT NOTE A PROGRAM... FTS.IAMG.ORG PROGRAM DESCRIPTION The input polygon coordinates are converted to seconds and the latitudical origin is shifted by add- ing 90 36000 to avoid a negative latitude value (as in the situation of the southern hemisphere). Further computations...

  20. REEFER: a digital computer program for the simulation of high energy electron tubes. [Reefer

    Energy Technology Data Exchange (ETDEWEB)

    Boers, J.E.

    1976-11-01

    A digital computer program for the simulation of very high-energy electron and ion beams is described. The program includes space-charge effects through the solution of Poisson's equation and magnetic effects (both induced and applied) through the relativistic trajectory equations. Relaxation techniques are employed while alternately computing electric fields and trajectories. Execution time is generally less than 15 minutes on a CDC 6600 digital computer. Either space-charge-limited or field-emission sources may be simulated. The input data is described in detail and an example data set is included.

  1. Plane stress calculations with a two dimensional elastic-plastic computer program. [HEMP

    Energy Technology Data Exchange (ETDEWEB)

    Wilkins, M.L.; Guinan, M.W.

    1976-04-05

    In the study of ductile fracture it is useful to simulate fracture on the computer under plane stress conditions. In general, this is a three dimensional problem. Presented here is a method for adapting a two dimensional elastic-plastic computer program to calculate problems in plane stress as well as plane strain geometry. A simulation of a tension test of a flat aluminum plate pulled to failure is calculated with the modified two dimensional program. The results are compared with a fully three dimensional calculation. Finally a comparison is made with an experiment to demonstrate the effectiveness of the computational methods for studying fracture of work hardening materials.

  2. Using and Evaluating ISEE, a New Computer Program for Teaching Sampling and Statistical Inference.

    Science.gov (United States)

    Dimitrova, Ganka; And Others

    1993-01-01

    Describes the background, development, and testing of a computer software program designed to teach principles of statistical sampling in social science courses. Compares results of a field test of the program, Introduction to Sampling Error Experiments (ISEE), with traditional instruction. (CFR)

  3. Problem-Solving Strategies and Group Processes in Small Groups Learning Computer Programming.

    Science.gov (United States)

    Webb, Noreen M.; And Others

    1986-01-01

    Planning and debugging strategies and group processes predicting learning of computer programming were studied in 30 students aged 11 to 14. Students showed little advance planning. Factors associated with learning included high-level planning of program chunks, debugging of single statements, explaining, and verbalizing aloud while typing.…

  4. Incorporating a Computer Assisted Reading Program into an Adult Vocational Basic Skills Lab.

    Science.gov (United States)

    Vescial, Ann; And Others

    A computer-assisted reading program was implemented in the VESL (Vocational English as a Second Language) Center at Hacienda La Puente Adult Schools (California), which provides support services to adult special needs vocational students. The purpose of the program was to improve the technical reading skills of the vocational students. The basic…

  5. Manned space station environmental control and life support system computer-aided technology assessment program

    Science.gov (United States)

    Hall, J. B., Jr.; Pickett, S. J.; Sage, K. H.

    1984-01-01

    A computer program for assessing manned space station environmental control and life support systems technology is described. The methodology, mission model parameters, evaluation criteria, and data base for 17 candidate technologies for providing metabolic oxygen and water to the crew are discussed. Examples are presented which demonstrate the capability of the program to evaluate candidate technology options for evolving space station requirements.

  6. Computer Programs in Marine Science: Key to Oceanographic Records Documentation No. 5.

    Science.gov (United States)

    Firestone, Mary A.

    Presented are abstracts of 700 computer programs in marine science. The programs listed are categorized under a wide range of headings which include physical oceanography, chemistry, coastal and estuarine processes, biology, pollution, air-sea interaction and heat budget, navigation and charting, curve fitting, and applied mathematics. The…

  7. Teaching Ethical Copyright Behavior: Assessing the Effects of a University-Sponsored Computing Ethics Program

    Science.gov (United States)

    Siemens, Jennifer Christie; Kopp, Steven W.

    2006-01-01

    Universities have become sensitized to the potential for students' illegal downloading of copyrighted materials. Education has been advocated as one way to curb downloading of copyrighted digital content. This study investigates the effectiveness of a university-sponsored computing ethics education program. The program positively influenced…

  8. A multi-media computer program for training in basic professional counseling skills

    NARCIS (Netherlands)

    Adema, J.; Van Der Zee, K. I.

    2003-01-01

    This paper concerns the development of a self-instructional program for training in basic counseling skills. The product was a multimedia computer program, named GEVAT. The training under consideration was based on a traditional training in which students enhance these skills under supervision.

  9. Sets, Probability and Statistics: The Mathematics of Life Insurance. [Computer Program.] Second Edition.

    Science.gov (United States)

    King, James M.; And Others

    The materials described here represent the conversion of a highly popular student workbook "Sets, Probability and Statistics: The Mathematics of Life Insurance" into a computer program. The program is designed to familiarize students with the concepts of sets, probability, and statistics, and to provide practice using real life examples. It also…

  10. A microcomputer-based tutorial program for computer-based training and patient care.

    Science.gov (United States)

    Hayes, J R; Menke, J A

    1985-04-01

    This program provides the nonprogrammer a tool to develop easily modified computer assisted tutorials, tests, and simulations with a word processor. In addition, by using the branching and query features of this program, one can easily develop text files that provide rapid access to information related to patient care such as neonatal formularies and patient care algorithms.

  11. [The physician and the computer. 22. Programming in the Prolog language].

    Science.gov (United States)

    Feber, J; Kasal, P

    1989-01-01

    A modern tool of interaction with the computer is the programming language Prolog. The authors discuss its position among other languages, emphasize its different character (declarative programming). They outline basic structures of Prolog and its type of function. They also give examples of creating data bases of patients and the possibility to use this language in the creation of expert systems in medicine.

  12. Gender and Stereotypes in Motivation to Study Computer Programming for Careers in Multimedia

    Science.gov (United States)

    Doube, Wendy; Lang, Catherine

    2012-01-01

    A multimedia university programme with relatively equal numbers of male and female students in elective programming subjects provided a rare opportunity to investigate female motivation to study and pursue computer programming in a career. The MSLQ was used to survey 85 participants. In common with research into deterrence of females from STEM…

  13. The Use of a Computer-Based Writing Program: Facilitation or Frustration?

    Science.gov (United States)

    Chen, Chi-Fen Emily; Cheng, Wei-Yuan

    2006-01-01

    The invention of computer-based writing program has revolutionized the way of teaching second language writing. Embedded with artificial intelligence scoring engine, it can provide students with both immediate score and diagnostic feedback on their essays. In addition, some of such programs offer convenient writing and editing tools to facilitate…

  14. ADAM: A computer program to simulate selective-breeding schemes for animals

    DEFF Research Database (Denmark)

    Pedersen, L D; Sørensen, A C; Henryon, M

    2009-01-01

    ADAM is a computer program that models selective breeding schemes for animals using stochastic simulation. The program simulates a population of animals and traces the genetic changes in the population under different selective breeding scenarios. It caters to different population structures......, genetic models, selection strategies, and mating designs. ADAM can be used to evaluate breeding schemes and generate genetic data to test statistical tools...

  15. Computers-for-edu: An Advanced Business Application Programming (ABAP) Teaching Case

    Science.gov (United States)

    Boyle, Todd A.

    2007-01-01

    The "Computers-for-edu" case is designed to provide students with hands-on exposure to creating Advanced Business Application Programming (ABAP) reports and dialogue programs, as well as navigating various mySAP Enterprise Resource Planning (ERP) transactions needed by ABAP developers. The case requires students to apply a wide variety…

  16. Factors Impacting Adult Learner Achievement in a Technology Certificate Program on Computer Networks

    Science.gov (United States)

    Delialioglu, Omer; Cakir, Hasan; Bichelmeyer, Barbara A.; Dennis, Alan R.; Duffy, Thomas M.

    2010-01-01

    This study investigates the factors impacting the achievement of adult learners in a technology certificate program on computer networks. We studied 2442 participants in 256 institutions. The participants were older than age 18 and were enrolled in the Cisco Certified Network Associate (CCNA) technology training program as "non-degree" or…

  17. The Impact on Future Guidance Programs of Current Developments in Computer Science, Telecommunications, and Biotechnology.

    Science.gov (United States)

    Mitchell, Lynda K.; Hardy, Philippe L.

    The purpose of this chapter is to envision how the era of technological revolution will affect the guidance, counseling, and student support programs of the future. Advances in computer science, telecommunications, and biotechnology are discussed. These advances have the potential to affect dramatically the services of guidance programs of the…

  18. Evaluation of a Pilot Program for Computer Literacy in Grades K-8.

    Science.gov (United States)

    Still, Jacquelyn H.

    1985-01-01

    A curriculum guide and suggested instructional resource materials were developed for a school district program in computer literacy for kindergarten through grade 8. The program was piloted with 43 teachers in 9 elementary schools and 1 junior high school in 1984 in the Orange County (Florida) School District. A structured response questionnaire…

  19. SHOCK AND VIBRATION COMPUTER PROGRAMS. REVIEWS AND SUMMARIES

    Science.gov (United States)

    1975-01-01

    SABOR / DRASTIC6 [37], SATANS [38], SHORE [39], SMERSH [40], STAGS [41], TROCS [42], UNIVALVE [43] and WHAM [23].7 Information about these programs...Chey consider. A comparison of the capabilities of ANSYS, MARC, N0NLIN2, PETR0S3, REPSIL, STACSA1, STAGSB, DYHAPLAS II, DYNASOR II, SABOR /DRASTIC6...N0NLIN2 VTHAH UNIVALVE WHAM IMAN WHAM DYNAPLAS/ PETROS3 DYNASOR REPSIL SABOR / STAGS DRASTIC6 («BAM) SATANS SMERSH SHORE TROCS A brief

  20. DORMAN computer program (study 2.5). Volume 2: User's guide and programmer's guide. [development of data bank for computerized information storage of NASA programs

    Science.gov (United States)

    Wray, S. T., Jr.

    1973-01-01

    The DORMAN program was developed to create and modify a data bank containing data decks which serve as input to the DORCA Computer Program. Via a remote terminal a user can access the bank, extract any data deck, modify that deck, output the modified deck to be input to the DORCA program, and save the modified deck in the data bank. This computer program is an assist in the utilization of the DORCA program. The program is dimensionless and operates almost entirely in integer mode. The program was developed on the CDC 6400/7600 complex for implementation on a UNIVAC 1108 computer.

  1. Algorithmic differentiation of pragma-defined parallel regions differentiating computer programs containing OpenMP

    CERN Document Server

    Förster, Michael

    2014-01-01

    Numerical programs often use parallel programming techniques such as OpenMP to compute the program's output values as efficient as possible. In addition, derivative values of these output values with respect to certain input values play a crucial role. To achieve code that computes not only the output values simultaneously but also the derivative values, this work introduces several source-to-source transformation rules. These rules are based on a technique called algorithmic differentiation. The main focus of this work lies on the important reverse mode of algorithmic differentiation. The inh

  2. A digital computer program for the dynamic interaction simulation of controls and structure (DISCOS), volume 1

    Science.gov (United States)

    Bodley, C. S.; Devers, A. D.; Park, A. C.; Frisch, H. P.

    1978-01-01

    A theoretical development and associated digital computer program system for the dynamic simulation and stability analysis of passive and actively controlled spacecraft are presented. The dynamic system (spacecraft) is modeled as an assembly of rigid and/or flexible bodies not necessarily in a topological tree configuration. The computer program system is used to investigate total system dynamic characteristics, including interaction effects between rigid and/or flexible bodies, control systems, and a wide range of environmental loadings. In addition, the program system is used for designing attitude control systems and for evaluating total dynamic system performance, including time domain response and frequency domain stability analyses.

  3. User’s Guide: Computer Program for Three-Dimensional Analysis of Building Systems (CTABS80).

    Science.gov (United States)

    1981-08-01

    computer program TABS (1,2,3) was the direct " feedback " from the profession in the use of these programs. The first of these programs, FRMSTC, is a static...II. ~ gil a gilt eig gggg go gte *,0 glee 10 eeC ’MO * eel a 10 III. * il - C a iii - - egg’ a *. - let 4 0 a gill tel 4 C - - tie 10 lii

  4. Dynamic Programming and Graph Algorithms in Computer Vision*

    Science.gov (United States)

    Felzenszwalb, Pedro F.; Zabih, Ramin

    2013-01-01

    Optimization is a powerful paradigm for expressing and solving problems in a wide range of areas, and has been successfully applied to many vision problems. Discrete optimization techniques are especially interesting, since by carefully exploiting problem structure they often provide non-trivial guarantees concerning solution quality. In this paper we briefly review dynamic programming and graph algorithms, and discuss representative examples of how these discrete optimization techniques have been applied to some classical vision problems. We focus on the low-level vision problem of stereo; the mid-level problem of interactive object segmentation; and the high-level problem of model-based recognition. PMID:20660950

  5. Effectiveness of computer ergonomics interventions for an engineering company: a program evaluation.

    Science.gov (United States)

    Goodman, Glenn; Landis, James; George, Christina; McGuire, Sheila; Shorter, Crystal; Sieminski, Michelle; Wilson, Tamika

    2005-01-01

    Ergonomic principles at the computer workstation may reduce the occurrence of work related injuries commonly associated with intensive computer use. A program implemented in 2001 by an occupational therapist and a physical therapist utilized these preventative measures with education about ergonomics, individualized evaluations of computer workstations, and recommendations for ergonomic and environmental changes. This study examined program outcomes and perceived effectiveness based on review of documents, interviews, and surveys of the employees and the plant manager. The program was deemed successful as shown by 59% of all therapist recommendations and 74% of ergonomic recommendations being implemented by the company, with an 85% satisfaction rate for the ergonomic interventions and an overall employee satisfaction rate of 70%. Eighty-one percent of the physical problems reported by employees were resolved to their satisfaction one year later. Successful implementation of ergonomics programs depend upon effective communication and education of the consumers, and the support, cooperation and collaboration of management and employees.

  6. The Implementation of Blended Learning Using Android-Based Tutorial Video in Computer Programming Course II

    Science.gov (United States)

    Huda, C.; Hudha, M. N.; Ain, N.; Nandiyanto, A. B. D.; Abdullah, A. G.; Widiaty, I.

    2018-01-01

    Computer programming course is theoretical. Sufficient practice is necessary to facilitate conceptual understanding and encouraging creativity in designing computer programs/animation. The development of tutorial video in an Android-based blended learning is needed for students’ guide. Using Android-based instructional material, students can independently learn anywhere and anytime. The tutorial video can facilitate students’ understanding about concepts, materials, and procedures of programming/animation making in detail. This study employed a Research and Development method adapting Thiagarajan’s 4D model. The developed Android-based instructional material and tutorial video were validated by experts in instructional media and experts in physics education. The expert validation results showed that the Android-based material was comprehensive and very feasible. The tutorial video was deemed feasible as it received average score of 92.9%. It was also revealed that students’ conceptual understanding, skills, and creativity in designing computer program/animation improved significantly.

  7. High performance computing and communications grand challenges program

    Energy Technology Data Exchange (ETDEWEB)

    Solomon, J.E.; Barr, A.; Chandy, K.M.; Goddard, W.A., III; Kesselman, C.

    1994-10-01

    The so-called protein folding problem has numerous aspects, however it is principally concerned with the {ital de novo} prediction of three-dimensional (3D) structure from the protein primary amino acid sequence, and with the kinetics of the protein folding process. Our current project focuses on the 3D structure prediction problem which has proved to be an elusive goal of molecular biology and biochemistry. The number of local energy minima is exponential in the number of amino acids in the protein. All current methods of 3D structure prediction attempt to alleviate this problem by imposing various constraints that effectively limit the volume of conformational space which must be searched. Our Grand Challenge project consists of two elements: (1) a hierarchical methodology for 3D protein structure prediction; and (2) development of a parallel computing environment, the Protein Folding Workbench, for carrying out a variety of protein structure prediction/modeling computations. During the first three years of this project, we are focusing on the use of two proteins selected from the Brookhaven Protein Data Base (PDB) of known structure to provide validation of our prediction algorithms and their software implementation, both serial and parallel. Both proteins, protein L from {ital peptostreptococcus magnus}, and {ital streptococcal} protein G, are known to bind to IgG, and both have an {alpha} {plus} {beta} sandwich conformation. Although both proteins bind to IgG, they do so at different sites on the immunoglobin and it is of considerable biological interest to understand structurally why this is so. 12 refs., 1 fig.

  8. APPLICATION OF CLOUD COMPUTING IN PROGRAMMING INTELLIGENT ELECTRIC NETWORKS IN PROSUMERS’ HOUSEHOLDS

    Directory of Open Access Journals (Sweden)

    Marek Horyński

    2016-11-01

    Full Text Available Currently, cloud computing models are provided with increasing a number of new functionalities. The paper describes a laboratory model of intelligent KNX system which makes it possible to test the practical use of cloud computing in components programming for this system. The cloud computing elements were used for this purpose. Innovatory features of services transferred to the cloud computing models consists in the integration of advanced IT techniques and Internet technologies based systems with the users services, in this case with the management of an intelligent building system. The software ETS5 installed on workstation is another important component of the station being discussed.

  9. Concurrent ventral hernia repair in patients undergoing laparoscopic bariatric surgery: a case-matched study using the National Surgical Quality Improvement Program Database.

    Science.gov (United States)

    Khorgami, Zhamak; Haskins, Ivy N; Aminian, Ali; Andalib, Amin; Rosen, Michael J; Brethauer, Stacy A; Schauer, Philip R

    2017-06-01

    There is no consensus regarding the optimal management of ventral hernias encountered during bariatric surgery. To compare early patient morbidity and mortality between those patients undergoing laparoscopic bariatric surgery only and those patients undergoing laparoscopic bariatric surgery with concomitant ventral hernia repair. American College of Surgeons National Surgical Quality Improvement Program Database (NSQIP). All patients undergoing laparoscopic Roux-en-Y gastric bypass and sleeve gastrectomy from 2012-2013 were identified within the NSQIP database. Those patients undergoing concomitant ventral hernia repair were compared with patients undergoing bariatric surgery only using a 1:1 matched analysis. Primary outcomes of interest included differences in 30-day composite adverse events, unplanned 30-day reoperation, and unplanned 30-day readmission to the hospital. A total of 27,608 patients underwent laparoscopic bariatric surgery during the study period; 988 (3.6%) patients underwent concomitant ventral hernia repair. After 1:1 matching, 1976 patients were evaluated. In terms of 30-day patient morbidity, patients who underwent concomitant ventral hernia were significantly more likely to experience all primary outcomes of interest, including composite adverse events (P = .01), a higher rate of unplanned return to the operating room (Pbariatric surgery experience increased 30-day morbidity. Optimal management of concurrent ventral hernias and timing of repair in bariatric surgical patients requires further investigation. Copyright © 2017 American Society for Bariatric Surgery. Published by Elsevier Inc. All rights reserved.

  10. Impact Evaluation of a System-Wide Chronic Disease Management Program on Health Service Utilisation: A Propensity-Matched Cohort Study.

    Directory of Open Access Journals (Sweden)

    Laurent Billot

    2016-06-01

    Full Text Available The New South Wales Health (NSW Health Chronic Disease Management Program (CDMP delivers interventions to adults at risk of hospitalisation for five target chronic conditions that respond well to ambulatory care: diabetes, hypertension, chronic obstructive pulmonary disease, congestive heart failure, and coronary artery disease. The intervention consists of two main components: (1 care coordination across sectors (acute, ambulatory, and community care from both public and private sectors and clinical specialties, facilitated by program care coordinators, and (2 health coaching including management of lifestyle risk factors and medications and self-management. These components were broadly prescribed by the head office of NSW Health, which funded the program, and were implemented by regional health services (local health districts in ways that best suited their own history, environment, workforce, and patient need. We used a propensity-matched cohort study to evaluate health service utilisation after enrolment in the CDMP.The evaluation cohort included 41,303 CDMP participants enrolled between 1 January 2011 and 31 December 2013 who experienced at least one hospital admission or emergency department (ED presentation for a target condition in the 12 mo preceding enrolment. Potential controls were selected from patients not enrolled in the CDMP but experiencing at least one hospital admission or ED presentation over the same period. Each CDMP patient in the evaluation cohort was matched to one control using 1:1 propensity score matching. The primary outcome was avoidable hospitalisations. Secondary outcomes included avoidable readmissions, avoidable bed days, unplanned hospitalisations, unplanned readmissions, unplanned bed days, ED presentations, and all-cause death. The primary analysis consisted of 30,057 CDMP participants and 30,057 matched controls with a median follow-up of 15 mo. Of those, 25,638 (85.3% and 25,597 (85.2% were alive by the

  11. Tangible computer programming: Exploring the use of emerging technology in classrooms and science museums

    Science.gov (United States)

    Horn, Michael S.

    In considering ways to improve the use of digital technology in educational settings, it is helpful to look beyond desktop computers and conventional modes of interaction and consider the flood of emerging technologies that already play a prominent role in the everyday lives of children. In this dissertation, I will present a research project that builds on tangible user interface (TUI) technology to support computer programming and robotics activities in education settings. In particular, I will describe the design and implementation of a novel tangible computer programming language called Tern. I will also describe an evaluation of Tern's use in both formal and informal educational settings--as part of an interactive exhibit on robotics and computer programming called Robot Park on display at the Boston Museum of Science; and as part of a curriculum unit piloted in several kindergarten classrooms in the greater Boston area. In both cases, Tern allows children to create simple computer programs to control a robot. However, rather than using a keyboard or mouse to write programs on a computer screen, children instead use Tern to construct physical algorithmic structures using a collection of interlocking wooden blocks. The goal of this work is not to propose that tangible programming languages are general purpose tools that should replace existing graphical programming languages; rather, I will present evidence to support the argument that tangible programming begins to make sense when one considers the contexts and constraints of specific educational settings. Moreover, in these settings tangible languages can compensate for some of the shortcomings of graphical and text-based systems that have limited their use.

  12. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion An activity that is still in progress is computing for the heavy-ion program. The heavy-ion events are collected without zero suppression, so the event size is much large at roughly 11 MB per event of RAW. The central collisions are more complex and...

  13. Near-term hybrid vehicle program, phase 1. Appendix B: Design trade-off studies report. Volume 3: Computer program listings

    Science.gov (United States)

    1979-01-01

    A description and listing is presented of two computer programs: Hybrid Vehicle Design Program (HYVELD) and Hybrid Vehicle Simulation Program (HYVEC). Both of the programs are modifications and extensions of similar programs developed as part of the Electric and Hybrid Vehicle System Research and Development Project.

  14. Space shuttle solid rocket booster recovery system definition. Volume 3: SRB water impact loads computer program, user's manual

    Science.gov (United States)

    1973-01-01

    This user's manual describes the FORTRAN IV computer program developed to compute the total vertical load, normal concentrated pressure loads, and the center of pressure of typical SRB water impact slapdown pressure distributions specified in the baseline configuration. The program prepares the concentrated pressure load information in punched card format suitable for input to the STAGS computer program. In addition, the program prepares for STAGS input the inertia reacting loads to the slapdown pressure distributions.

  15. Implementation of the Distributed Parallel Program for Geoid Heights Computation Using MPI and Openmp

    Science.gov (United States)

    Lee, S.; Kim, J.; Jung, Y.; Choi, J.; Choi, C.

    2012-07-01

    Much research have been carried out using optimization algorithms for developing high-performance program, under the parallel computing environment with the evolution of the computer hardware technology such as dual-core processor and so on. Then, the studies by the parallel computing in geodesy and surveying fields are not so many. The present study aims to reduce running time for the geoid heights computation and carrying out least-squares collocation to improve its accuracy using distributed parallel technology. A distributed parallel program was developed in which a multi-core CPU-based PC cluster was adopted using MPI and OpenMP library. Geoid heights were calculated by the spherical harmonic analysis using the earth geopotential model of the National Geospatial-Intelligence Agency(2008). The geoid heights around the Korean Peninsula were calculated and tested in diskless-based PC cluster environment. As results, for the computing geoid heights by a earth geopotential model, the distributed parallel program was confirmed more effective to reduce the computational time compared to the sequential program.

  16. Multithreaded transactions in scientific computing. The Growth06_v2 program

    Science.gov (United States)

    Daniluk, Andrzej

    2009-07-01

    Writing a concurrent program can be more difficult than writing a sequential program. Programmer needs to think about synchronization, race conditions and shared variables. Transactions help reduce the inconvenience of using threads. A transaction is an abstraction, which allows programmers to group a sequence of actions on the program into a logical, higher-level computation unit. This paper presents a new version of the GROWTHGr and GROWTH06 programs. New version program summaryProgram title: GROWTH06_v2 Catalogue identifier: ADVL_v2_1 Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVL_v2_1.html Program obtainable from: CPC Program Library, Queen's University, Belfast, N. Ireland Licensing provisions: Standard CPC licence, http://cpc.cs.qub.ac.uk/licence/licence.html No. of lines in distributed program, including test data, etc.: 65 255 No. of bytes in distributed program, including test data, etc.: 865 985 Distribution format: tar.gz Programming language: Object Pascal Computer: Pentium-based PC Operating system: Windows 9x, XP, NT, Vista RAM: more than 1 MB Classification: 4.3, 7.2, 6.2, 8, 14 Catalogue identifier of previous version: ADVL_v2_0 Journal reference of previous version: Comput. Phys. Comm. 175 (2006) 678 Does the new version supersede the previous version?: Yes Nature of problem: The programs compute the RHEED intensities during the growth of thin epitaxial structures prepared using the molecular beam epitaxy (MBE). The computations are based on the use of kinematical diffraction theory. Solution method: Epitaxial growth of thin films is modelled by a set of non-linear differential equations [1]. The Runge-Kutta method with adaptive stepsize control was used for solving initial value problem for non-linear differential equations [2]. Reasons for new version: According to the users' suggestions functionality of the program has been improved. Moreover, new use cases have been added which make the handling of the program easier and more

  17. A COMPUTER PROGRAM FOR INTERPRETATION OF THE DATA OF VERTICAL ELECTRICAL SOUNDING VEZ-4A

    Directory of Open Access Journals (Sweden)

    D. G. Koliushko

    2017-06-01

    Full Text Available Purpose. Creating a computer program for interpreting the results of vertical sounding the soil in the form of multilayer model most typical for Ukraine. Methodology. The algorithm of the program is constructed on determination the soil structure with the help of the method of point source current, method of analogy and method of equivalent. The option of automatic interpretation based on Hook-Jeeves method. The program is implemented in the programming language Delphi. Results. The computer program «VEZ-4A» has a possibility of the interactive and automatic interpretation sounding results in the multi-layered geoelectrical model. Originality. In first time the computer program for analyzing and interpreting results of the soil sounding by Wenner configuration was created on the base of the analytical solution for field of current point source located in four-, three- or two-layer structure. In paper the review is presented and basic functions of our program are analyzed. Practical value. The program «VEZ-4A» is created and adapted for use in the electromagnetic diagnostics of grounding of existing power plants and substations.

  18. Teaching Scientific Computing: A Model-Centered Approach to Pipeline and Parallel Programming with C

    Directory of Open Access Journals (Sweden)

    Vladimiras Dolgopolovas

    2015-01-01

    Full Text Available The aim of this study is to present an approach to the introduction into pipeline and parallel computing, using a model of the multiphase queueing system. Pipeline computing, including software pipelines, is among the key concepts in modern computing and electronics engineering. The modern computer science and engineering education requires a comprehensive curriculum, so the introduction to pipeline and parallel computing is the essential topic to be included in the curriculum. At the same time, the topic is among the most motivating tasks due to the comprehensive multidisciplinary and technical requirements. To enhance the educational process, the paper proposes a novel model-centered framework and develops the relevant learning objects. It allows implementing an educational platform of constructivist learning process, thus enabling learners’ experimentation with the provided programming models, obtaining learners’ competences of the modern scientific research and computational thinking, and capturing the relevant technical knowledge. It also provides an integral platform that allows a simultaneous and comparative introduction to pipelining and parallel computing. The programming language C for developing programming models and message passing interface (MPI and OpenMP parallelization tools have been chosen for implementation.

  19. 24 CFR 92.221 - Match credit.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Match credit. 92.221 Section 92.221... INVESTMENT PARTNERSHIPS PROGRAM Program Requirements Matching Contribution Requirement § 92.221 Match credit. (a) When credit is given. Contributions are credited on a fiscal year basis at the time the...

  20. 7 CFR 3406.5 - Matching support.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Matching support. 3406.5 Section 3406.5 Agriculture... § 3406.5 Matching support. The Department strongly encourages and may require non-Federal matching support for this program. In the annual program solicitation, CSREES will announce any incentives that may...