WorldWideScience

Sample records for publications computer file

  1. Computer files.

    Science.gov (United States)

    Malik, M

    1995-02-01

    From what has been said, several recommendations can be made for users of small personal computers regardless of which operating system they use. If your computer has a large hard disk not specially required by any single application, organize the disk into a small number of volumes. You will then be using the computer as if it had several smaller disks, which will help you to create a logical file structure. The size of individual volumes has to be selected carefully with respect to the files kept in each volume. Otherwise, it may be that you will have too much space in one volume and not enough in another. In each volume, organize the structure of directories and subdirectories logically so that they correspond to the logic of your file content. Be aware of the fact that the directories suggested as default when installing new software are often not the optimum. For instance, it is better to put different graphics packages under a common subdirectory rather than to install them at the same level as all other packages including statistics, text processors, etc. Create a special directory for each task you use the computer. Note that it is a bad practice to keep many different and logically unsorted files in the root directory of any of your volumes. Only system and important service files should be kept there. Although any file may be written all over the disk, access to it will be faster if it is written over the minimum number of cylinders. From time to time, use special programs that reorganize your files in this way.(ABSTRACT TRUNCATED AT 250 WORDS)

  2. MMLEADS Public Use File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Medicare-Medicaid Linked Enrollee Analytic Data Source (MMLEADS) Public Use File (PUF) contains demographic, enrollment, condition prevalence, utilization, and...

  3. 50 CFR 20.155 - Public file.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 6 2010-10-01 2010-10-01 false Public file. 20.155 Section 20.155... § 20.155 Public file. (a) Establishment. A public file will be established for each rulemaking to which.... 552, a public file established pursuant to paragraph (a) of this section will contain: (1) The...

  4. Earnings Public-Use File, 2006

    Data.gov (United States)

    Social Security Administration — Social Security Administration released Earnings Public-Use File (EPUF) for 2006. File contains earnings information for individuals drawn from a systematic random...

  5. 40 CFR 720.95 - Public file.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Public file. 720.95 Section 720.95... PREMANUFACTURE NOTIFICATION Confidentiality and Public Access to Information § 720.95 Public file. All..., will become part of the public file for that notice, unless such materials are claimed confidential....

  6. Ambulance Reasonable Charge Public Use Files

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Ambulance Reasonable Charge public use files for calendar years (CY) 2003 through 2005 are located in the Downloads section below. These public use files are...

  7. 10 CFR 501.35 - Public file.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Public file. 501.35 Section 501.35 Energy DEPARTMENT OF... Hearings and Conferences During Administrative Proceedings § 501.35 Public file. (a) Contents. The public file shall consist of the rule, order, or petition, with supporting data and supplemental...

  8. 40 CFR 725.95 - Public file.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Public file. 725.95 Section 725.95... Public file. All information submitted, including any health and safety study of a microorganism and other supporting documentation, will become part of the public file for that submission, unless...

  9. Permanent-File-Validation Utility Computer Program

    Science.gov (United States)

    Derry, Stephen D.

    1988-01-01

    Errors in files detected and corrected during operation. Permanent File Validation (PFVAL) utility computer program provides CDC CYBER NOS sites with mechanism to verify integrity of permanent file base. Locates and identifies permanent file errors in Mass Storage Table (MST) and Track Reservation Table (TRT), in permanent file catalog entries (PFC's) in permit sectors, and in disk sector linkage. All detected errors written to listing file and system and job day files. Program operates by reading system tables , catalog track, permit sectors, and disk linkage bytes to vaidate expected and actual file linkages. Used extensively to identify and locate errors in permanent files and enable online correction, reducing computer-system downtime.

  10. Chronic Condition Public Use File (PUF)

    Data.gov (United States)

    U.S. Department of Health & Human Services — This release contains the Chronic Conditions Public Use Files (PUF) with information from Medicare claims. The CMS Chronic Conditions PUF is an aggregated file in...

  11. Public Computation & Boundary Play

    CERN Document Server

    Sengupta, Pratim

    2016-01-01

    In this paper, we introduce 'public computation' as a genre of learning environments that can be used to radically broaden public participation in authentic, computation-enabled STEM disciplinary practices. Our paradigmatic approach utilizes open source software designed for professional scientists, engineers and digital artists, and situates them in an undiluted form, alongside live and archived expert support, in a public space. We present a case study of DigiPlay, a prototypical public computation space we designed at the University of Calgary, where users can interact directly with scientific simulations as well as the underlying open source code using an array of massive multi- touch screens. We argue that in such a space, public interactions with the code can be thought of as boundary work and play, through which public participation becomes legitimate scientific act, as the public engages in scientific creation through truly open-ended explorations with the code.

  12. Medicare Geographic Variation - Public Use File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Medicare Geographic Variation Public Use File provides the ability to view demographic, utilization and quality indicators at the state level (including...

  13. Health Insurance Marketplace Public Use Files

    Data.gov (United States)

    U.S. Department of Health & Human Services — A set of seven (7) public use files containing information on health insurance issuers participating in the Health Insurance Marketplace and certified qualified...

  14. Public Document Room file classification system

    Energy Technology Data Exchange (ETDEWEB)

    1982-06-01

    This listing contains detailed descriptions of the file classification system for documents available from the Public Document Room (PDR) of the US Nuclear Regulatory Commission. As a public service branch of the agency, the PDR maintains facilities for receiving, processing, storing, and retrieving documents which NRC generates or receives in performing its regulatory function. Unlike a library, the PDR does not maintain collections of formally published materials, such as books, monographs, serials, periodicals, or general indexes. The documents on file at the PDR can be reports, written records of meetings (transcripts), existing or proposed regulations, the text of licenses or their amendments, and correspondence.

  15. Small file aggregation in a parallel computing system

    Science.gov (United States)

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Grider, Gary; Zhang, Jingwang

    2014-09-02

    Techniques are provided for small file aggregation in a parallel computing system. An exemplary method for storing a plurality of files generated by a plurality of processes in a parallel computing system comprises aggregating the plurality of files into a single aggregated file; and generating metadata for the single aggregated file. The metadata comprises an offset and a length of each of the plurality of files in the single aggregated file. The metadata can be used to unpack one or more of the files from the single aggregated file.

  16. Supplemental Security Income Public-Use Microdata File, 2001 Data

    Data.gov (United States)

    Social Security Administration — The SSI Public-Use Microdata File contains an extract of data fields from SSA's Supplemental Security Record file and consists of a 5 percent random, representative...

  17. Publication-quality computer graphics

    Energy Technology Data Exchange (ETDEWEB)

    Slabbekorn, M.H.; Johnston, R.B. Jr.

    1981-01-01

    A user-friendly graphic software package is being used at Oak Ridge National Laboratory to produce publication-quality computer graphics. Close interaction between the graphic designer and computer programmer have helped to create a highly flexible computer graphics system. The programmer-oriented environment of computer graphics has been modified to allow the graphic designer freedom to exercise his expertise with lines, form, typography, and color. The resultant product rivals or surpasses that work previously done by hand. This presentation of computer-generated graphs, charts, diagrams, and line drawings clearly demonstrates the latitude and versatility of the software when directed by a graphic designer.

  18. Publication Bias The "File-Drawer Problem" in Scientific Inference

    CERN Document Server

    Scargle, J D

    1999-01-01

    Publication bias arises whenever the probability that a study is published depends on the statistical significance of its results. This bias, often called the file-drawer effect since the unpublished results are imagined to be tucked away in researchers' file cabinets, is potentially a severe impediment to combining the statistical results of studies collected from the literature. With almost any reasonable quantitative model for publication bias, only a small number of studies lost in the file-drawer will produce a significant bias. This result contradicts the well known Fail Safe File Drawer (FSFD) method for setting limits on the potential harm of publication bias, widely used in social, medical and psychic research. This method incorrectly treats the file drawer as unbiased, and almost always misestimates the seriousness of publication bias. A large body of not only psychic research, but medical and social science studies, has mistakenly relied on this method to validate claimed discoveries. Statistical c...

  19. 43 CFR 6.9 - Publication and public use of invention before patent application is filed.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Publication and public use of invention... Interior PATENT REGULATIONS Inventions by Employees § 6.9 Publication and public use of invention before patent application is filed. (a) Publication or public use of an invention constitutes a statutory bar to...

  20. Basic Stand Alone Medicare Claims Public Use Files

    Data.gov (United States)

    U.S. Department of Health & Human Services — CMS is committed to increasing access to its Medicare claims data through the release of de-identified data files available for public use. They contain...

  1. Administration of Library-Owned Computer Files. SPEC Kit 159.

    Science.gov (United States)

    Shaw, Suzanne J.

    This document reports the results of a follow-up survey of 34 Association of Research Libraries member libraries which was conducted in 1989 to measure changes that had taken place in the administration of computer files (CF)--previously referred to as machine readable data files--since the original survey in 1984. It is noted that this survey…

  2. Computer Science and Technology Publications. NBS Publications List 84.

    Science.gov (United States)

    National Bureau of Standards (DOC), Washington, DC. Inst. for Computer Sciences and Technology.

    This bibliography lists publications of the Institute for Computer Sciences and Technology of the National Bureau of Standards. Publications are listed by subject in the areas of computer security, computer networking, and automation technology. Sections list publications of: (1) current Federal Information Processing Standards; (2) computer…

  3. Publication Bias ( The "File-Drawer Problem") in Scientific Inference

    Science.gov (United States)

    Scargle, Jeffrey D.; DeVincenzi, Donald (Technical Monitor)

    1999-01-01

    Publication bias arises whenever the probability that a study is published depends on the statistical significance of its results. This bias, often called the file-drawer effect since the unpublished results are imagined to be tucked away in researchers' file cabinets, is potentially a severe impediment to combining the statistical results of studies collected from the literature. With almost any reasonable quantitative model for publication bias, only a small number of studies lost in the file-drawer will produce a significant bias. This result contradicts the well known Fail Safe File Drawer (FSFD) method for setting limits on the potential harm of publication bias, widely used in social, medical and psychic research. This method incorrectly treats the file drawer as unbiased, and almost always miss-estimates the seriousness of publication bias. A large body of not only psychic research, but medical and social science studies, has mistakenly relied on this method to validate claimed discoveries. Statistical combination can be trusted only if it is known with certainty that all studies that have been carried out are included. Such certainty is virtually impossible to achieve in literature surveys.

  4. Publication Bias ( The "File-Drawer Problem") in Scientific Inference

    Science.gov (United States)

    Scargle, Jeffrey D.; DeVincenzi, Donald (Technical Monitor)

    1999-01-01

    Publication bias arises whenever the probability that a study is published depends on the statistical significance of its results. This bias, often called the file-drawer effect since the unpublished results are imagined to be tucked away in researchers' file cabinets, is potentially a severe impediment to combining the statistical results of studies collected from the literature. With almost any reasonable quantitative model for publication bias, only a small number of studies lost in the file-drawer will produce a significant bias. This result contradicts the well known Fail Safe File Drawer (FSFD) method for setting limits on the potential harm of publication bias, widely used in social, medical and psychic research. This method incorrectly treats the file drawer as unbiased, and almost always miss-estimates the seriousness of publication bias. A large body of not only psychic research, but medical and social science studies, has mistakenly relied on this method to validate claimed discoveries. Statistical combination can be trusted only if it is known with certainty that all studies that have been carried out are included. Such certainty is virtually impossible to achieve in literature surveys.

  5. Distributing an executable job load file to compute nodes in a parallel computer

    Science.gov (United States)

    Gooding, Thomas M.

    2016-08-09

    Distributing an executable job load file to compute nodes in a parallel computer, the parallel computer comprising a plurality of compute nodes, including: determining, by a compute node in the parallel computer, whether the compute node is participating in a job; determining, by the compute node in the parallel computer, whether a descendant compute node is participating in the job; responsive to determining that the compute node is participating in the job or that the descendant compute node is participating in the job, communicating, by the compute node to a parent compute node, an identification of a data communications link over which the compute node receives data from the parent compute node; constructing a class route for the job, wherein the class route identifies all compute nodes participating in the job; and broadcasting the executable load file for the job along the class route for the job.

  6. Distributing an executable job load file to compute nodes in a parallel computer

    Energy Technology Data Exchange (ETDEWEB)

    Gooding, Thomas M.

    2016-09-13

    Distributing an executable job load file to compute nodes in a parallel computer, the parallel computer comprising a plurality of compute nodes, including: determining, by a compute node in the parallel computer, whether the compute node is participating in a job; determining, by the compute node in the parallel computer, whether a descendant compute node is participating in the job; responsive to determining that the compute node is participating in the job or that the descendant compute node is participating in the job, communicating, by the compute node to a parent compute node, an identification of a data communications link over which the compute node receives data from the parent compute node; constructing a class route for the job, wherein the class route identifies all compute nodes participating in the job; and broadcasting the executable load file for the job along the class route for the job.

  7. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Science.gov (United States)

    2010-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public... of the Internet on NARA-supplied computers? (a) Public access computers (workstations) are available... use personally owned diskettes on NARA personal computers. You may not load files or any type of...

  8. Medicare claims data as public use files: a new tool for public health surveillance.

    Science.gov (United States)

    Erdem, Erkan; Korda, Holly; Haffer, Samuel Chris; Sennett, Cary

    2014-01-01

    Claims data are an important source of data for public health surveillance but have not been widely used in the United States because of concern with personally identifiable health information and other issues. We describe the development and availability of a new set of public use files created using de-identified health care claims for fee-for-service Medicare beneficiaries, including individuals 65 years and older and individuals with disabilities younger than 65 years, and their application as tools for public health surveillance. We provide an overview of these files and their attributes; a review of beneficiary de-identification procedures and implications for analysis; a summary of advantages and limitations for use of the public use files for surveillance, alone and in combination with other data sources; and discussion and examples of their application for public health surveillance using examples that address chronic conditions monitoring, hospital readmissions, and prevalence and expenditures in diabetes care.

  9. Sharing digital micrographs and other data files between computers.

    Science.gov (United States)

    Entwistle, A

    2004-01-01

    It ought to be easy to exchange digital micrographs and other computer data files with a colleague even on another continent. In practice, this often is not the case. The advantages and disadvantages of various methods that are available for exchanging data files between computers are discussed. When possible, data should be transferred through computer networking. When data are to be exchanged locally between computers with similar operating systems, the use of a local area network is recommended. For computers in commercial or academic environments that have dissimilar operating systems or are more widely spaced, the use of FTPs is recommended. Failing this, posting the data on a website and transferring by hypertext transfer protocol is suggested. If peer to peer exchange between computers in domestic environments is needed, the use of Messenger services such as Microsoft Messenger or Yahoo Messenger is the method of choice. When it is not possible to transfer the data files over the internet, single use, writable CD ROMs are the best media for transferring data. If for some reason this is not possible, DVD-R/RW, DVD+R/RW, 100 MB ZIP disks and USB flash media are potentially useful media for exchanging data files.

  10. Resource file: practical publications for energy management, edition III

    Energy Technology Data Exchange (ETDEWEB)

    1980-03-01

    The Resource File is an in-depth bibliography of 166 practical and action-oriented energy conservation publications and materials. It is a reference tool, designed for Federal, state, and local energy managers or people who are asked to recommend how-to conservation guides to the public. Each listing describes a publication's intended audience and provides a summary of its contents. Included are operations and maintenance manuals, life-cycle costing handbooks, home insulation manuals, films on fuel-saving driving techniques, and courses devoted exclusively to home weatherization. 166 items.

  11. 29 CFR 459.1 - Computation of time for filing papers.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Computation of time for filing papers. 459.1 Section 459.1... OF CONDUCT MISCELLANEOUS § 459.1 Computation of time for filing papers. In computing any period of... computations. When these regulations require the filing of any paper, such document must be received by...

  12. NET: an inter-computer file transfer command

    Energy Technology Data Exchange (ETDEWEB)

    Burris, R.D.

    1978-05-01

    The NET command was defined and supported in order to facilitate file transfer between computers. Among the goals of the implementation were greatest possible ease of use, maximum power (i.e., support of a diversity of equipment and operations), and protection of the operating system.

  13. 5 CFR 2429.21 - Computation of time for filing papers.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Computation of time for filing papers... REQUIREMENTS General Requirements § 2429.21 Computation of time for filing papers. (a) In computing any period... § 2429.23(a) of this part, when this subchapter requires the filing of any paper with the Authority,...

  14. Old Age, Survivors, and Disability Insurance (OASDI) Public-Use Microdata File, 2001 Data

    Data.gov (United States)

    Social Security Administration — The OASDI Public-Use Microdata File contains an extract of data fields from SSA's Master Beneficiary Record file and consists of a 1 percent random, representative...

  15. 12 CFR 25.43 - Content and availability of public file.

    Science.gov (United States)

    2010-01-01

    ... the good name or reputation of any persons other than the bank or publication of which would violate... Evaluation prepared by the OCC. The bank shall place this copy in the public file within 30 business days.... The bank shall place the statement in the public file within three business days of its receipt from...

  16. 12 CFR 563e.43 - Content and availability of public file.

    Science.gov (United States)

    2010-01-01

    ... on the good name or reputation of any persons other than the savings association or publication of... this copy in the public file within 30 business days after its receipt from the OTS; (3) A list of the... savings association shall place the statement in the public file within three business days of its receipt...

  17. 12 CFR 228.43 - Content and availability of public file.

    Science.gov (United States)

    2010-01-01

    ... name or reputation of any persons other than the bank or publication of which would violate specific... prepared by the Board. The bank shall place this copy in the public file within 30 business days after its... shall place the statement in the public file within three business days of its receipt from the Board...

  18. Development of CONSER Cataloging Policies for Remote Access Computer File Serials.

    Science.gov (United States)

    Anderson, Bill; Hawkins, Les

    1996-01-01

    Describes the development of CONSER (Cooperative Online Serials) policies and practices for cataloging remote access computer file serials. Topics include electronic serials on the Internet, cataloging standards for computer files, OCLC and Internet resources, networked resources as published documents, multiple file formats, sources of…

  19. Storing files in a parallel computing system based on user or application specification

    Science.gov (United States)

    Faibish, Sorin; Bent, John M.; Nick, Jeffrey M.; Grider, Gary; Torres, Aaron

    2016-03-29

    Techniques are provided for storing files in a parallel computing system based on a user-specification. A plurality of files generated by a distributed application in a parallel computing system are stored by obtaining a specification from the distributed application indicating how the plurality of files should be stored; and storing one or more of the plurality of files in one or more storage nodes of a multi-tier storage system based on the specification. The plurality of files comprise a plurality of complete files and/or a plurality of sub-files. The specification can optionally be processed by a daemon executing on one or more nodes in a multi-tier storage system. The specification indicates how the plurality of files should be stored, for example, identifying one or more storage nodes where the plurality of files should be stored.

  20. Bringing computational science to the public.

    Science.gov (United States)

    McDonagh, James L; Barker, Daniel; Alderson, Rosanna G

    2016-01-01

    The increasing use of computers in science allows for the scientific analyses of large datasets at an increasing pace. We provided examples and interactive demonstrations at Dundee Science Centre as part of the 2015 Women in Science festival, to present aspects of computational science to the general public. We used low-cost Raspberry Pi computers to provide hands on experience in computer programming and demonstrated the application of computers to biology. Computer games were used as a means to introduce computers to younger visitors. The success of the event was evaluated by voluntary feedback forms completed by visitors, in conjunction with our own self-evaluation. This work builds on the original work of the 4273π bioinformatics education program of Barker et al. (2013, BMC Bioinform. 14:243). 4273π provides open source education materials in bioinformatics. This work looks at the potential to adapt similar materials for public engagement events. It appears, at least in our small sample of visitors (n = 13), that basic computational science can be conveyed to people of all ages by means of interactive demonstrations. Children as young as five were able to successfully edit simple computer programs with supervision. This was, in many cases, their first experience of computer programming. The feedback is predominantly positive, showing strong support for improving computational science education, but also included suggestions for improvement. Our conclusions are necessarily preliminary. However, feedback forms suggest methods were generally well received among the participants; "Easy to follow. Clear explanation" and "Very easy. Demonstrators were very informative." Our event, held at a local Science Centre in Dundee, demonstrates that computer games and programming activities suitable for young children can be performed alongside a more specialised and applied introduction to computational science for older visitors.

  1. 12 CFR 345.43 - Content and availability of public file.

    Science.gov (United States)

    2010-01-01

    ... nor the responses contain statements that reflect adversely on the good name or reputation of any... bank shall place this copy in the public file within 30 business days after its receipt from the FDIC... statement in the public file within three business days of its receipt from the FDIC. (2) Banks required to...

  2. Converting Between PLY and Ballistic Research Laboratory-Computer-Aided Design (BRL-CAD) File Formats

    Science.gov (United States)

    2015-02-01

    Converting Between PLY and Ballistic Research Laboratory–Computer-Aided Design (BRL- CAD ) File Formats by Rishub Jain ARL-CR-0760...0760 February 2015 Converting Between PLY and Ballistic Research Laboratory–Computer-Aided Design (BRL- CAD ) File Formats Rishub Jain US...and Ballistic Research Laboratory–Computer-Aided Design (BRL- CAD ) File Formats 5a. CONTRACT NUMBER W911NF-10-2-0076 5b. GRANT NUMBER 5c. PROGRAM

  3. 43 CFR 6.10 - Publicity concerning the invention after patent application is filed.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Publicity concerning the invention after... Interior PATENT REGULATIONS Inventions by Employees § 6.10 Publicity concerning the invention after patent application is filed. In order that the public may obtain the greatest possible benefit from inventions in...

  4. Methods and apparatus for multi-resolution replication of files in a parallel computing system using semantic information

    Energy Technology Data Exchange (ETDEWEB)

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Grider, Gary; Torres, Aaron

    2015-10-20

    Techniques are provided for storing files in a parallel computing system using different resolutions. A method is provided for storing at least one file generated by a distributed application in a parallel computing system. The file comprises one or more of a complete file and a sub-file. The method comprises the steps of obtaining semantic information related to the file; generating a plurality of replicas of the file with different resolutions based on the semantic information; and storing the file and the plurality of replicas of the file in one or more storage nodes of the parallel computing system. The different resolutions comprise, for example, a variable number of bits and/or a different sub-set of data elements from the file. A plurality of the sub-files can be merged to reproduce the file.

  5. Public access computing in health science libraries.

    Science.gov (United States)

    Kehm, S

    1987-01-01

    Public access computing in health science libraries began with online computer-assisted instruction. Library-based collections and services have expanded with advances in microcomputing hardware and software. This growth presents problems: copyright, quality, instability in the publishing industry, and uncertainty about collection scope; librarians managing the new services require new skills to support their collections. Many find the cooperative efforts of several organizational units are required. Current trends in technology for the purpose of information management indicate that these services will continue to be a significant focus for libraries.

  6. 12 CFR 269b.720 - Computation of time for filing papers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Computation of time for filing papers. 269b.720... papers. In computing any period of time prescribed by or allowed by the panel, the day of the act, event... regulations in this subchapter require the filing of any paper, such document must be received by the panel...

  7. Analyzing Log Files to Predict Students' Problem Solving Performance in a Computer-Based Physics Tutor

    Science.gov (United States)

    Lee, Young-Jin

    2015-01-01

    This study investigates whether information saved in the log files of a computer-based tutor can be used to predict the problem solving performance of students. The log files of a computer-based physics tutoring environment called Andes Physics Tutor was analyzed to build a logistic regression model that predicted success and failure of students'…

  8. Arranging and finding folders and files on your Windows 7 computer

    CERN Document Server

    Steps, Studio Visual

    2014-01-01

    If you have lots of documents on your desk, it may prove to be impossible to find the document you are looking for. In order to easily find certain documents, they are often stored in a filing cabinet and arranged in a logical order. The folders on your computer serve the same purpose. They do not just contain files; they can also contain other folders. You can create an unlimited number of folders, and each folder can contain any number of subfolders and files. You can use Windows Explorer, also called the folder window, to work with the files and folders on your computer. You can copy, delete, move, find, and sort files, among other things. Or you can transfer files and folders to a USB stick, an external hard drive, a CD, DVD or Blu-Ray disk. In this practical guide we will show you how to use the folder window, and help you arrange your own files.

  9. Comparison of canal transportation and centering ability of hand Protaper files and rotary Protaper files by using micro computed tomography

    OpenAIRE

    Amit Gandhi; Taru Gandhi

    2011-01-01

    Introduction and objective: The aim of the present study was to compare root canal preparation with rotary ProTaper files and hand ProTaper files to find a better instrumentation technique for maintaining root canal geometry with the aid of computed tomography. Material and methods: Twenty curved root canals with at least 10 degree of curvature were divided into 2 groups of 10 teeth each. In group I the canals were prepared with hand ProTaper files and in group II the canals were prepared wit...

  10. Heuristic file sorted assignment algorithm of parallel I/O on cluster computing system

    Institute of Scientific and Technical Information of China (English)

    CHEN Zhi-gang; ZENG Bi-qing; XIONG Ce; DENG Xiao-heng; ZENG Zhi-wen; LIU An-feng

    2005-01-01

    A new file assignment strategy of parallel I/O, which is named heuristic file sorted assignment algorithm was proposed on cluster computing system. Based on the load balancing, it assigns the files to the same disk according to the similar service time. Firstly, the files were sorted and stored at the set I in descending order in terms of their service time, then one disk of cluster node was selected randomly when the files were to be assigned, and at last the continuous files were taken orderly from the set I to the disk until the disk reached its load maximum. The experimental results show that the new strategy improves the performance by 20.2% when the load of the system is light and by 31.6% when the load is heavy. And the higher the data access rate, the more evident the improvement of the performance obtained by the heuristic file sorted assignment algorithm.

  11. Public Websites and Human–computer Interaction

    DEFF Research Database (Denmark)

    Sørum, Hanne; Andersen, Kim Normann; Vatrapu, Ravi

    2012-01-01

    The focus of this paper is to investigate measurement of website quality and user satisfaction. More specifically, the paper reports on a study investigating whether users of high-quality public websites are more satisfied than those of low-quality websites. Adopting a human–computer interaction...... perspective, we have gathered data from the 2009 public website awards in Scandinavia. Our analysis of Norwegian and Danish websites reveals that the use of quality criteria is highly technical compared to the traditional usability testing focus on efficiency, effectiveness and satisfaction of the actual...... system use by representatives. A Pearson correlation analysis of user evaluation from 296 websites that participated in the Danish web award Bedst på Nettet (‘Top of the Web’) showed no significant positive correlation between website quality and user satisfaction. We put forward recommendations...

  12. RRB / SSI Interface Checkwriting Integrated Computer Operation Extract File (CHICO)

    Data.gov (United States)

    Social Security Administration — This monthly file provides SSA with information about benefit payments made to railroad retirement beneficiaries. SSA uses this data to verify Supplemental Security...

  13. 76 FR 56428 - City of Holland, Michigan Board of Public Works; Notice of Filing

    Science.gov (United States)

    2011-09-13

    ... Energy Regulatory Commission City of Holland, Michigan Board of Public Works; Notice of Filing Take... Electric Reliability Corporation (NERC) \\2\\ the City of Holland, Michigan Board of Public Works (Holland... Compliance Committee denying Holland BPW's appeal of the decision of ReliabilityFirst Corporation to...

  14. Technical documentation for the 1990 Nationwide Truck Activity and Commodity Survey Public Use File

    Energy Technology Data Exchange (ETDEWEB)

    1992-09-01

    The Nationwide Truck Activity and Commodity Survey (NTACS) provides detailed activity data for a sample of trucks covered in the 1987 Truck Inventory and Use Survey (TIUS) for days selected at random over a 12-month period ending in 1990. The NTACS was conducted by the US Bureau of the Census for the US Department of Transportation (DOT). A Public Use File for the NTACS was developed by Oak Ridge National Laboratory (ORNL) under a reimbursable agreement with the DOT. The content of the Public Use File and the design of the NTACS are described in this document.

  15. Technical documentation for the 1990 Nationwide Truck Activity and Commodity Survey Public Use File

    Energy Technology Data Exchange (ETDEWEB)

    1992-09-01

    The Nationwide Truck Activity and Commodity Survey (NTACS) provides detailed activity data for a sample of trucks covered in the 1987 Truck Inventory and Use Survey (TIUS) for days selected at random over a 12-month period ending in 1990. The NTACS was conducted by the US Bureau of the Census for the US Department of Transportation (DOT). A Public Use File for the NTACS was developed by Oak Ridge National Laboratory (ORNL) under a reimbursable agreement with the DOT. The content of the Public Use File and the design of the NTACS are described in this document.

  16. De-identifying a public use microdata file from the Canadian national discharge abstract database.

    Science.gov (United States)

    El Emam, Khaled; Paton, David; Dankar, Fida; Koru, Gunes

    2011-08-23

    The Canadian Institute for Health Information (CIHI) collects hospital discharge abstract data (DAD) from Canadian provinces and territories. There are many demands for the disclosure of this data for research and analysis to inform policy making. To expedite the disclosure of data for some of these purposes, the construction of a DAD public use microdata file (PUMF) was considered. Such purposes include: confirming some published results, providing broader feedback to CIHI to improve data quality, training students and fellows, providing an easily accessible data set for researchers to prepare for analyses on the full DAD data set, and serve as a large health data set for computer scientists and statisticians to evaluate analysis and data mining techniques. The objective of this study was to measure the probability of re-identification for records in a PUMF, and to de-identify a national DAD PUMF consisting of 10% of records. Plausible attacks on a PUMF were evaluated. Based on these attacks, the 2008-2009 national DAD was de-identified. A new algorithm was developed to minimize the amount of suppression while maximizing the precision of the data. The acceptable threshold for the probability of correct re-identification of a record was set at between 0.04 and 0.05. Information loss was measured in terms of the extent of suppression and entropy. Two different PUMF files were produced, one with geographic information, and one with no geographic information but more clinical information. At a threshold of 0.05, the maximum proportion of records with the diagnosis code suppressed was 20%, but these suppressions represented only 8-9% of all values in the DAD. Our suppression algorithm has less information loss than a more traditional approach to suppression. Smaller regions, patients with longer stays, and age groups that are infrequently admitted to hospitals tend to be the ones with the highest rates of suppression. The strategies we used to maximize data utility and

  17. De-identifying a public use microdata file from the Canadian national discharge abstract database

    Directory of Open Access Journals (Sweden)

    Paton David

    2011-08-01

    Full Text Available Abstract Background The Canadian Institute for Health Information (CIHI collects hospital discharge abstract data (DAD from Canadian provinces and territories. There are many demands for the disclosure of this data for research and analysis to inform policy making. To expedite the disclosure of data for some of these purposes, the construction of a DAD public use microdata file (PUMF was considered. Such purposes include: confirming some published results, providing broader feedback to CIHI to improve data quality, training students and fellows, providing an easily accessible data set for researchers to prepare for analyses on the full DAD data set, and serve as a large health data set for computer scientists and statisticians to evaluate analysis and data mining techniques. The objective of this study was to measure the probability of re-identification for records in a PUMF, and to de-identify a national DAD PUMF consisting of 10% of records. Methods Plausible attacks on a PUMF were evaluated. Based on these attacks, the 2008-2009 national DAD was de-identified. A new algorithm was developed to minimize the amount of suppression while maximizing the precision of the data. The acceptable threshold for the probability of correct re-identification of a record was set at between 0.04 and 0.05. Information loss was measured in terms of the extent of suppression and entropy. Results Two different PUMF files were produced, one with geographic information, and one with no geographic information but more clinical information. At a threshold of 0.05, the maximum proportion of records with the diagnosis code suppressed was 20%, but these suppressions represented only 8-9% of all values in the DAD. Our suppression algorithm has less information loss than a more traditional approach to suppression. Smaller regions, patients with longer stays, and age groups that are infrequently admitted to hospitals tend to be the ones with the highest rates of suppression

  18. 47 CFR 73.3526 - Local public inspection file of commercial stations.

    Science.gov (United States)

    2010-10-01

    ... application to which it refers). (14) Radio and television time brokerage agreements. For commercial radio and... which the statement applies. (16) Radio and television joint sales agreements. For commercial radio and... 47 Telecommunication 4 2010-10-01 2010-10-01 false Local public inspection file of...

  19. Fast and Easy Searching of Files in Unisys 2200 Computers

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    A program has been written to enable (1) fast and easy searching of symbolic files for one or more strings of characters, dates, or numerical values in specific fields or columns and (2) summarizing results of searching other fields or columns.

  20. Synchronizing files or images among several computers or removable devices. A utility to avoid frequent back-ups.

    Science.gov (United States)

    Leonardi, Rosalia; Maiorana, Francesco; Giordano, Daniela

    2008-06-01

    Many of us use and maintain files on more than 1 computer--a desktop part of the time, and a notebook, a palmtop, or removable devices at other times. It can be easy to forget which device contains the latest version of a particular file, and time-consuming searches often ensue. One way to solve this problem is to use software that synchronizes the files. This allows users to maintain updated versions of the same file in several locations.

  1. Free Oscilloscope Web App Using a Computer Mic, Built-In Sound Library, or Your Own Files

    Science.gov (United States)

    Ball, Edward; Ruiz, Frances; Ruiz, Michael J.

    2017-01-01

    We have developed an online oscilloscope program which allows users to see waveforms by utilizing their computer microphones, selecting from our library of over 30 audio files, and opening any *.mp3 or *.wav file on their computers. The oscilloscope displays real-time signals against time. The oscilloscope has been calibrated so one can make…

  2. Survey on Security Issues in File Management in Cloud Computing Environment

    Science.gov (United States)

    Gupta, Udit

    2015-06-01

    Cloud computing has pervaded through every aspect of Information technology in past decade. It has become easier to process plethora of data, generated by various devices in real time, with the advent of cloud networks. The privacy of users data is maintained by data centers around the world and hence it has become feasible to operate on that data from lightweight portable devices. But with ease of processing comes the security aspect of the data. One such security aspect is secure file transfer either internally within cloud or externally from one cloud network to another. File management is central to cloud computing and it is paramount to address the security concerns which arise out of it. This survey paper aims to elucidate the various protocols which can be used for secure file transfer and analyze the ramifications of using each protocol.

  3. r.maxent.lambdas - Computes raw and/or logistic prediction maps from MaxEnt lambdas files

    OpenAIRE

    Blumentrath, Stefan

    2016-01-01

    The script is intended to compute raw and/or logistic prediction maps from a lambdas file produced with MaxEnt 3.3.3e. It will parse the specified lambdas-file from MaxEnt 3.3.3e and translate it into an r.mapcalc-expression which is then stored in a temporary file and finally piped to r.mapcalc. If alias names had been used in MaxEnt, these alias names can automatically be replaced according to a CSV-like file provided by the user. This file should contain alias names in the first column and...

  4. Dimensional quality control of Ti-Ni dental file by optical coordinate metrology and computed tomography

    DEFF Research Database (Denmark)

    Yagüe-Fabra, J.A.; Tosello, Guido; Ontiveros, S.

    2014-01-01

    Endodontic dental files usually present complex 3D geometries, which make the complete measurement of the component very challenging with conventional micro metrology tools. Computed Tomography (CT) can represent a suitable alternative solution to micro metrology tools based on optical and tactil...

  5. Participation of VAX VMS computers in IBM file-transfer networks

    Energy Technology Data Exchange (ETDEWEB)

    Raffenetti, R.C.

    1983-01-01

    Communications software written at Argonne National Laboratory enables VAX VMS computer systems to participate as end nodes in a standard IBM file-transfer network. The software, which emulates the IBM Network Job Entry (NJE) protocol, has been in use at Argonne for over two years, and is in use at other installations. The basic NJE services include transfer of print and punch files, job submittal, execution of remote commands, and transmission of user-to-user messages. The transmit services are asynchronous to the user's VMS session and received files are automatically routed to a designated user directory. Access to files is validated according to the VMS protection mechanism. New features which were added recently include application level software to transfer general, sequential files and to bridge the electronic mail systems of VMS and VM/CMS. This paper will review the NJE emulator and describe the design and implementation of the sequential file transfer service. The performance of the emulator will be described. Another paper at this symposium will describe the mail bridge.

  6. Computer-Assisted Management of Instruction in Veterinary Public Health

    Science.gov (United States)

    Holt, Elsbeth; And Others

    1975-01-01

    Reviews a course in Food Hygiene and Public Health at the University of Illinois College of Veterinary Medicine in which students are sequenced through a series of computer-based lessons or autotutorial slide-tape lessons, the computer also being used to route, test, and keep records. Since grades indicated mastery of the subject, the course will…

  7. Wildlife software: procedures for publication of computer software

    Science.gov (United States)

    Samuel, M.D.

    1990-01-01

    Computers and computer software have become an integral part of the practice of wildlife science. Computers now play an important role in teaching, research, and management applications. Because of the specialized nature of wildlife problems, specific computer software is usually required to address a given problem (e.g., home range analysis). This type of software is not usually available from commercial vendors and therefore must be developed by those wildlife professionals with particular skill in computer programming. Current journal publication practices generally prevent a detailed description of computer software associated with new techniques. In addition, peer review of journal articles does not usually include a review of associated computer software. Thus, many wildlife professionals are usually unaware of computer software that would meet their needs or of major improvements in software they commonly use. Indeed most users of wildlife software learn of new programs or important changes only by word of mouth.

  8. Free oscilloscope web app using a computer mic, built-in sound library, or your own files

    Science.gov (United States)

    Ball, Edward; Ruiz, Frances; Ruiz, Michael J.

    2017-07-01

    We have developed an online oscilloscope program which allows users to see waveforms by utilizing their computer microphones, selecting from our library of over 30 audio files, and opening any *.mp3 or *.wav file on their computers. The oscilloscope displays real-time signals against time. The oscilloscope has been calibrated so one can make accurate frequency measurements of periodic waves to within 1%. The web app is ideal for computer projection in class.

  9. DOC-a file system cache to support mobile computers

    Science.gov (United States)

    Huizinga, D. M.; Heflinger, K.

    1995-09-01

    This paper identifies design requirements of system-level support for mobile computing in small form-factor battery-powered portable computers and describes their implementation in DOC (Disconnected Operation Cache). DOC is a three-level client caching system designed and implemented to allow mobile clients to transition between connected, partially disconnected and fully disconnected modes of operation with minimal user involvement. Implemented for notebook computers, DOC addresses not only typical issues of mobile elements such as resource scarcity and fluctuations in service quality but also deals with the pitfalls of MS-DOS, the operating system which prevails in the commercial notebook market. Our experiments performed in the software engineering environment of AST Research indicate not only considerable performance gains for connected and partially disconnected modes of DOC, but also the successful operation of the disconnected mode.

  10. Code and papers: computing publication patterns in the LHC era

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Publications in scholarly journals establish the body of knowledge deriving from scientific research; they also play a fundamental role in the career path of scientists and in the evaluation criteria of funding agencies. This presentation reviews the evolution of computing-oriented publications in HEP following the start of operation of LHC. Quantitative analyses are illustrated, which document the production of scholarly papers on computing-related topics by HEP experiments and core tools projects (including distributed computing R&D), and the citations they receive. Several scientometric indicators are analyzed to characterize the role of computing in HEP literature. Distinctive features of scholarly publication production in the software-oriented and hardware-oriented experimental HEP communities are highlighted. Current patterns and trends are compared to the situation in previous generations' HEP experiments at LEP, Tevatron and B-factories. The results of this scientometric analysis document objec...

  11. 76 FR 12398 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Public Debt (BPD...

    Science.gov (United States)

    2011-03-07

    ... comparison file compiled of records from our expanded Medicare Database (MDB) File system of records in order to support our administration of the prescription drug subsidy program. The MDB File system of... computer systems and provide the response file to us as soon as possible. This agreement covers...

  12. 76 FR 40950 - Public Company Accounting Oversight Board; Notice of Filing of Proposed Board Funding Final Rules...

    Science.gov (United States)

    2011-07-12

    ... COMMISSION Public Company Accounting Oversight Board; Notice of Filing of Proposed Board Funding Final Rules for Allocation of the Board's Accounting Support Fee Among Issuers, Brokers, and Dealers, and Other... 2002 (the ``Act''), notice is hereby given that on June 21, 2011, the Public Company...

  13. Definitions of database files and fields of the Personal Computer-Based Water Data Sources Directory

    Science.gov (United States)

    Green, J. Wayne

    1991-01-01

    This report describes the data-base files and fields of the personal computer-based Water Data Sources Directory (WDSD). The personal computer-based WDSD was derived from the U.S. Geological Survey (USGS) mainframe computer version. The mainframe version of the WDSD is a hierarchical data-base design. The personal computer-based WDSD is a relational data- base design. This report describes the data-base files and fields of the relational data-base design in dBASE IV (the use of brand names in this abstract is for identification purposes only and does not constitute endorsement by the U.S. Geological Survey) for the personal computer. The WDSD contains information on (1) the type of organization, (2) the major orientation of water-data activities conducted by each organization, (3) the names, addresses, and telephone numbers of offices within each organization from which water data may be obtained, (4) the types of data held by each organization and the geographic locations within which these data have been collected, (5) alternative sources of an organization's data, (6) the designation of liaison personnel in matters related to water-data acquisition and indexing, (7) the volume of water data indexed for the organization, and (8) information about other types of data and services available from the organization that are pertinent to water-resources activities.

  14. Funding Public Computing Centers: Balancing Broadband Availability and Expected Demand

    Science.gov (United States)

    Jayakar, Krishna; Park, Eun-A

    2012-01-01

    The National Broadband Plan (NBP) recently announced by the Federal Communication Commission visualizes a significantly enhanced commitment to public computing centers (PCCs) as an element of the Commission's plans for promoting broadband availability. In parallel, the National Telecommunications and Information Administration (NTIA) has…

  15. A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture

    Directory of Open Access Journals (Sweden)

    Kawser Wazed Nafi

    2012-10-01

    Full Text Available The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. For this, security or personal information hiding process hampers. In this paper we have proposed new security architecture for cloud computing platform. This ensures secure communication system and hiding information from others. AES based file encryption system and asynchronous key system for exchanging information or data is included in this model. This structure can be easily applied with main cloud computing features, e.g. PaaS, SaaS and IaaS. This model also includes onetime password system for user authentication process. Our work mainly deals with the security system of the whole cloud computing platform.

  16. 43 CFR 4.1352 - Who may file; where to file; when to file.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Who may file; where to file; when to file... Indian Lands) § 4.1352 Who may file; where to file; when to file. (a) The applicant or operator may file... to file a timely request constitutes a waiver of the opportunity for a hearing before OSM makes...

  17. 37 CFR 201.26 - Recordation of documents pertaining to computer shareware and donation of public domain computer...

    Science.gov (United States)

    2010-07-01

    ... pertaining to computer shareware and donation of public domain computer software. 201.26 Section 201.26... GENERAL PROVISIONS § 201.26 Recordation of documents pertaining to computer shareware and donation of public domain computer software. (a) General. This section prescribes the procedures for submission of...

  18. Evaluation of clinical data in childhood asthma. Application of a computer file system

    Energy Technology Data Exchange (ETDEWEB)

    Fife, D.; Twarog, F.J.; Geha, R.S.

    1983-10-01

    A computer file system was used in our pediatric allergy clinic to assess the value of chest roentgenograms and hemoglobin determinations used in the examination of patients and to correlate exposure to pets and forced hot air with the severity of asthma. Among 889 children with asthma, 20.7% had abnormal chest roentgenographic findings, excluding hyperinflation and peribronchial thickening, and 0.7% had abnormal hemoglobin values. Environmental exposure to pets or forced hot air was not associated with increased severity of asthma, as assessed by five measures of outcome: number of medications administered, requirement for corticosteroids, frequency of clinic visits, frequency of emergency room visits, and frequency of hospitalizations.

  19. Documentation for the Academic Library Survey (ALS) Data File: Fiscal Year 2000 (Public Use). NCES 2006-342

    Science.gov (United States)

    Schmitt, Carl M.

    2006-01-01

    The purpose of this report is to document the procedures and methodologies employed during the Academic Library Survey of 2000. This report is designed to provide guidance and documentation for users of the public-release and restricted-use data files. Information about the universe of academic libraries and how to access this information is…

  20. Trust in social computing. The case of peer-to-peer file sharing networks

    Directory of Open Access Journals (Sweden)

    Heng Xu

    2011-09-01

    Full Text Available Social computing and online communities are changing the fundamental way people share information and communicate with each other. Social computing focuses on how users may have more autonomy to express their ideas and participate in social exchanges in various ways, one of which may be peer-to-peer (P2P file sharing. Given the greater risk of opportunistic behavior by malicious or criminal communities in P2P networks, it is crucial to understand the factors that affect individual’s use of P2P file sharing software. In this paper, we develop and empirically test a research model that includes trust beliefs and perceived risks as two major antecedent beliefs to the usage intention. Six trust antecedents are assessed including knowledge-based trust, cognitive trust, and both organizational and peer-network factors of institutional trust. Our preliminary results show general support for the model and offer some important implications for software vendors in P2P sharing industry and regulatory bodies.

  1. Final Technical Report - Publication and Retrieval of Computational Chemical-Physical Data Via the Semantic Web

    Energy Technology Data Exchange (ETDEWEB)

    Ostlund, Neil [Chemical Semantics, Inc.,Gainesville, FL (United States)

    2017-07-20

    This research showed the feasibility of applying the concepts of the Semantic Web to Computation Chemistry. We have created the first web portal (www.chemsem.com) that allows data created in the calculations of quantum chemistry, and other such chemistry calculations to be placed on the web in a way that makes the data accessible to scientists in a semantic form never before possible. The semantic web nature of the portal allows data to be searched, found, and used as an advance over the usual approach of a relational database. The semantic data on our portal has the nature of a Giant Global Graph (GGG) that can be easily merged with related data and searched globally via a SPARQL Protocol and RDF Query Language (SPARQL) that makes global searches for data easier than with traditional methods. Our Semantic Web Portal requires that the data be understood by a computer and hence defined by an ontology (vocabulary). This ontology is used by the computer in understanding the data. We have created such an ontology for computational chemistry (purl.org/gc) that encapsulates a broad knowledge of the field of computational chemistry. We refer to this ontology as the Gainesville Core. While it is perhaps the first ontology for computational chemistry and is used by our portal, it is only a start of what must be a long multi-partner effort to define computational chemistry. In conjunction with the above efforts we have defined a new potential file standard (Common Standard for eXchange – CSX for computational chemistry data). This CSX file is the precursor of data in the Resource Description Framework (RDF) form that the semantic web requires. Our portal translates CSX files (as well as other computational chemistry data files) into RDF files that are part of the graph database that the semantic web employs. We propose a CSX file as a convenient way to encapsulate computational chemistry data.

  2. 7 CFR 47.25 - Filing; extensions of time; effective date of filing; computations of time; official notice.

    Science.gov (United States)

    2010-01-01

    ... Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE MARKETING OF PERISHABLE AGRICULTURAL COMMODITIES RULES OF PRACTICE UNDER THE PERISHABLE AGRICULTURAL COMMODITIES ACT Rules Applicable to Reparation Proceedings § 47.25 Filing; extensions of...

  3. Purchase, pirate, publicize: The effect of file sharing on album sales

    OpenAIRE

    Lee, Jonathan

    2016-01-01

    This paper quantifies the relationship between private-network file sharing activity and music sales in the BitTorrent era. Using a panel dataset of 2,251 albums' U.S. sales and file sharing downloads on a private network during 2008, I estimate the effect of file sharing on album sales. Exogenous shocks to file sharing capacity address the simultaneity problem. In theory, piracy could crowd out legitimate sales by building file sharing capacity, but could also increase sales through word-of-...

  4. 78 FR 45513 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-07-29

    .... DESCRIPTION OF COMPUTER MATCHING PROGRAM: Each participating SPAA will send ACF an electronic file of eligible public assistance client information. These files are non- Federal computer records maintained by the... on no more than 10,000,000 public assistance beneficiaries. 2. The DMDC computer database...

  5. Experience of public procurement of Open Compute servers

    Science.gov (United States)

    Bärring, Olof; Guerri, Marco; Bonfillou, Eric; Valsan, Liviu; Grigore, Alexandru; Dore, Vincent; Gentit, Alain; Clement, Benoît; Grossir, Anthony

    2015-12-01

    The Open Compute Project. OCP (http://www.opencompute.org/). was launched by Facebook in 2011 with the objective of building efficient computing infrastructures at the lowest possible cost. The technologies are released as open hardware. with the goal to develop servers and data centres following the model traditionally associated with open source software projects. In 2013 CERN acquired a few OCP servers in order to compare performance and power consumption with standard hardware. The conclusions were that there are sufficient savings to motivate an attempt to procure a large scale installation. One objective is to evaluate if the OCP market is sufficiently mature and broad enough to meet the constraints of a public procurement. This paper summarizes this procurement. which started in September 2014 and involved the Request for information (RFI) to qualify bidders and Request for Tender (RFT).

  6. Teacher Perspectives on the Current State of Computer Technology Integration into the Public School Classroom

    Science.gov (United States)

    Zuniga, Ramiro

    2009-01-01

    Since the introduction of computers into the public school arena over forty years ago, educators have been convinced that the integration of computer technology into the public school classroom will transform education. Joining educators are state and federal governments. Public schools and others involved in the process of computer technology…

  7. Establishing a Web-Based DICOM Teaching File Authoring Tool Using Open-Source Public Software

    OpenAIRE

    Lee, Wen-Jeng; Yang, Chung-Yi; Liu, Kao-Lang; Liu, Hon-Man; Ching, Yu-Tai; Chen, Shyh-Jye

    2005-01-01

    Online teaching files are an important source of educational and referential materials in the radiology community. The commonly used Digital Imaging and Communications in Medicine (DICOM) file format of the radiology community is not natively supported by common Web browsers. The ability of the Web server to convert and parse DICOM is important when the DICOM-converting tools are not available. In this paper, we describe our approach to develop a Web-based teaching file authoring tool. Our se...

  8. 78 FR 7768 - Public Service Company of Colorado; Notice of Application Accepted for Filing, Soliciting Motions...

    Science.gov (United States)

    2013-02-04

    ... Contact: Christine E. Johnston, Xcel Energy, 4653 Table Mountain Drive, Golden, CO 80403; (720) 497-2156... will consider all protests or other comments filed, but only those who file a motion to intervene in... accordance with 18 CFR 4.34(b) and 385.2010. o. Procedural Schedule: The application will be...

  9. Modification to the Monte Carlo N-Particle (MCNP) Visual Editor (MCNPVised) to Read in Computer Aided Design (CAD) Files

    Energy Technology Data Exchange (ETDEWEB)

    Randolph Schwarz; Leland L. Carter; Alysia Schwarz

    2005-08-23

    Monte Carlo N-Particle Transport Code (MCNP) is the code of choice for doing complex neutron/photon/electron transport calculations for the nuclear industry and research institutions. The Visual Editor for Monte Carlo N-Particle is internationally recognized as the best code for visually creating and graphically displaying input files for MCNP. The work performed in this grant was used to enhance the capabilities of the MCNP Visual Editor to allow it to read in both 2D and 3D Computer Aided Design (CAD) files, allowing the user to electronically generate a valid MCNP input geometry.

  10. Modification to the Monte Carlo N-Particle (MCNP) Visual Editor (MCNPVised) to Read in Computer Aided Design (CAD) Files

    Energy Technology Data Exchange (ETDEWEB)

    Randolph Schwarz; Leland L. Carter; Alysia Schwarz

    2005-08-23

    Monte Carlo N-Particle Transport Code (MCNP) is the code of choice for doing complex neutron/photon/electron transport calculations for the nuclear industry and research institutions. The Visual Editor for Monte Carlo N-Particle is internationally recognized as the best code for visually creating and graphically displaying input files for MCNP. The work performed in this grant was used to enhance the capabilities of the MCNP Visual Editor to allow it to read in both 2D and 3D Computer Aided Design (CAD) files, allowing the user to electronically generate a valid MCNP input geometry.

  11. 32 CFR 310.52 - Computer matching publication and review requirements.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Computer matching publication and review... OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.52 Computer matching publication and review requirements. (a) DoD Components shall identify...

  12. Ethics, big data and computing in epidemiology and public health.

    Science.gov (United States)

    Salerno, Jennifer; Knoppers, Bartha M; Lee, Lisa M; Hlaing, WayWay M; Goodman, Kenneth W

    2017-05-01

    This article reflects on the activities of the Ethics Committee of the American College of Epidemiology (ACE). Members of the Ethics Committee identified an opportunity to elaborate on knowledge gained since the inception of the original Ethics Guidelines published by the ACE Ethics and Standards of Practice Committee in 2000. The ACE Ethics Committee presented a symposium session at the 2016 Epidemiology Congress of the Americas in Miami on the evolving complexities of ethics and epidemiology as it pertains to "big data." This article presents a summary and further discussion of that symposium session. Three topic areas were presented: the policy implications of big data and computing, the fallacy of "secondary" data sources, and the duty of citizens to contribute to big data. A balanced perspective is needed that provides safeguards for individuals but also furthers research to improve population health. Our in-depth review offers next steps for teaching of ethics and epidemiology, as well as for epidemiological research, public health practice, and health policy. To address contemporary topics in the area of ethics and epidemiology, the Ethics Committee hosted a symposium session on the timely topic of big data. Technological advancements in clinical medicine and genetic epidemiology research coupled with rapid advancements in data networks, storage, and computation at a lower cost are resulting in the growth of huge data repositories. Big data increases concerns about data integrity; informed consent; protection of individual privacy, confidentiality, and harm; data reidentification; and the reporting of faulty inferences. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. 43 CFR 4.1381 - Who may file; when to file; where to file.

    Science.gov (United States)

    2010-10-01

    ... may file; when to file; where to file. (a) Any person who receives a written decision issued by OSM under 30 CFR 773.28 on a challenge to an ownership or control listing or finding may file a request for... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Who may file; when to file; where to...

  14. Project Integration Architecture (PIA) and Computational Analysis Programming Interface (CAPRI) for Accessing Geometry Data from CAD Files

    Science.gov (United States)

    Benyo, Theresa L.

    2002-01-01

    Integration of a supersonic inlet simulation with a computer aided design (CAD) system is demonstrated. The integration is performed using the Project Integration Architecture (PIA). PIA provides a common environment for wrapping many types of applications. Accessing geometry data from CAD files is accomplished by incorporating appropriate function calls from the Computational Analysis Programming Interface (CAPRI). CAPRI is a CAD vendor neutral programming interface that aids in acquiring geometry data directly from CAD files. The benefits of wrapping a supersonic inlet simulation into PIA using CAPRI are; direct access of geometry data, accurate capture of geometry data, automatic conversion of data units, CAD vendor neutral operation, and on-line interactive history capture. This paper describes the PIA and the CAPRI wrapper and details the supersonic inlet simulation demonstration.

  15. The Research Foci of Computing Research in South Africa as Reflected by Publications in the South African Computer Journal

    Directory of Open Access Journals (Sweden)

    Paula Kotze

    2010-07-01

    Full Text Available The South African Computer Journal, better known as SACJ, has, for the last nineteen years, been one of the most pertinent publications for the computing discipline within the South African milieu. In this paper we reflect on the topics of research articles published in SACJ over its first 40 volumes of the journal using the ACM Computing Classification Scheme as basis. In our analysis we divided the publications into three cycles of more or less six years in order to identify significant trends over the history of the journal. We also used the same classification scheme to analyse the publication trends of various South African tertiary education and research institutions.

  16. Geothermal-energy files in computer storage: sites, cities, and industries

    Energy Technology Data Exchange (ETDEWEB)

    O' Dea, P.L.

    1981-12-01

    The site, city, and industrial files are described. The data presented are from the hydrothermal site file containing about three thousand records which describe some of the principal physical features of hydrothermal resources in the United States. Data elements include: latitude, longitude, township, range, section, surface temperature, subsurface temperature, the field potential, and well depth for commercialization. (MHR)

  17. Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques

    CERN Document Server

    Naji, A W; Zaidan, B B; Al-Khateeb, Wajdi F; Khalifa, Othman O; Zaidan, A A; Gunawan, Teddy S

    2009-01-01

    The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information. Furthermore, there is no formal method to be followed to discover a hidden data. In this paper, a new information hiding framework is presented.The proposed framework aim is implementation of framework computation between advance encryption standard (AES) and distortion technique (DT) which embeds information in image page within executable file (EXE file) to find a secure solution to cover file without change the size of cover file. The framework includes two main functions; first is the hiding of the information in the image page of EXE file, through the execution of four process (specify the cover file, spec...

  18. 7 CFR 900.15 - Filing; extensions of time; effective date of filing; and computation of time.

    Science.gov (United States)

    2010-01-01

    ...; and computation of time. 900.15 Section 900.15 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE GENERAL REGULATIONS Rules of Practice and Procedure...

  19. 41 CFR 304-3.17 - If I am required to file a confidential or public financial disclosure report, must I report...

    Science.gov (United States)

    2010-07-01

    ... a confidential or public financial disclosure report, must I report travel payments I receive from a....17 If I am required to file a confidential or public financial disclosure report, must I report... Ethics in Government Act of 1978). Note: The confidential financial disclosure report is OGE Form 450...

  20. Public policy and regulatory implications for the implementation of Opportunistic Cloud Computing Services for Enterprises

    DEFF Research Database (Denmark)

    Kuada, Eric; Olesen, Henning; Henten, Anders

    2012-01-01

    Opportunistic Cloud Computing Services (OCCS) is a social network approach to the provisioning and management of cloud computing services for enterprises. This paper discusses how public policy and regulations will impact on OCCS implementation. We rely on documented publicly available government...

  1. Research foci of computing research in South Africa as reflected by publications in the South African computer journal

    CSIR Research Space (South Africa)

    Kotzé, P

    2009-01-01

    Full Text Available The South African Computer Journal, better known as SACJ, has, for the last nineteen years, been one of the most pertinent publications for the computing discipline within the South African milieu. In this paper the authors reflect on the topics...

  2. User's guide for MODTOOLS: Computer programs for translating data of MODFLOW and MODPATH into geographic information system files

    Science.gov (United States)

    Orzol, Leonard L.

    1997-01-01

    MODTOOLS is a set of computer programs for translating data of the ground-water model, MODFLOW, and the particle-tracker, MODPATH, into a Geographic Information System (GIS). MODTOOLS translates data into a GIS software called ARC/INFO. MODFLOW is the recognized name for the U.S. Geological Survey Modular Three-Dimensional Finite-Difference Ground-Water Model. MODTOOLS uses the data arrays input to or output by MODFLOW during a ground-water flow simulation to construct several types of GIS output files. MODTOOLS can also be used to translate data from MODPATH into GIS files. MODPATH and its companion program, MODPATH-PLOT, are collectively called the U.S. Geological Survey Three-Dimensional Particle Tracking Post-Processing Programs. MODPATH is used to calculate ground-water flow paths using the results of MODFLOW and MODPATH-PLOT can be used to display the flow paths in various ways.

  3. 77 FR 74829 - Notice of Public Meeting-Cloud Computing and Big Data Forum and Workshop

    Science.gov (United States)

    2012-12-18

    ... National Institute of Standards and Technology Notice of Public Meeting--Cloud Computing and Big Data Forum...) announces a Cloud Computing and Big Data Forum and Workshop to be held on Tuesday, January 15, Wednesday... workshop. The NIST Cloud Computing and Big Data Forum and Workshop will bring together leaders and...

  4. 77 FR 26509 - Notice of Public Meeting-Cloud Computing Forum & Workshop V

    Science.gov (United States)

    2012-05-04

    ... National Institute of Standards and Technology Notice of Public Meeting--Cloud Computing Forum & Workshop V... announces the Cloud Computing Forum & Workshop V to be held on Tuesday, Wednesday and Thursday, June 5, 6... provide information on the U.S. Government (USG) Cloud Computing Technology Roadmap initiative. This...

  5. 76 FR 62373 - Notice of Public Meeting-Cloud Computing Forum & Workshop IV

    Science.gov (United States)

    2011-10-07

    ... National Institute of Standards and Technology Notice of Public Meeting--Cloud Computing Forum & Workshop...: NIST announces the Cloud Computing Forum & Workshop IV to be held on November 2, 3 and 4, 2011. This workshop will provide information on the U.S. Government (USG) Cloud Computing Technology Roadmap...

  6. EPA National Center for Computational Toxicology UPDATE (ICCVAM public forum)

    Science.gov (United States)

    A presentation to the ICCVAM Public Forum on several new and exciting activities at NCCT, including Chemical library update, Chemistry Dashboard, Retrofitting in vitro assays with metabolic competence and In vitro PK.

  7. Computational system to create an entry file for replicating I-125 seeds simulating brachytherapy case studies using the MCNPX code

    Directory of Open Access Journals (Sweden)

    Leonardo da Silva Boia

    2014-03-01

    Full Text Available Purpose: A computational system was developed for this paper in the C++ programming language, to create a 125I radioactive seed entry file, based on the positioning of a virtual grid (template in voxel geometries, with the purpose of performing prostate cancer treatment simulations using the MCNPX code.Methods: The system is fed with information from the planning system with regard to each seed’s location and its depth, and an entry file is automatically created with all the cards (instructions for each seed regarding their cell blocks and surfaces spread out spatially in the 3D environment. The system provides with precision a reproduction of the clinical scenario for the MCNPX code’s simulation environment, thereby allowing the technique’s in-depth study.Results and Conclusion: The preliminary results from this study showed that the lateral penumbra of uniform scanning proton beams was less sensitive In order to validate the computational system, an entry file was created with 88 125I seeds that were inserted in the phantom’s MAX06 prostate region with initial activity determined for the seeds at the 0.27 mCi value. Isodose curves were obtained in all the prostate slices in 5 mm steps in the 7 to 10 cm interval, totaling 7 slices. Variance reduction techniques were applied in order to optimize computational time and the reduction of uncertainties such as photon and electron energy interruptions in 4 keV and forced collisions regarding cells of interest. Through the acquisition of isodose curves, the results obtained show that hot spots have values above 300 Gy, as anticipated in literature, stressing the importance of the sources’ correct positioning, in which the computational system developed provides, in order not to release excessive doses in adjacent risk organs. The 144 Gy prescription curve showed in the validation process that it covers perfectly a large percentage of the volume, at the same time that it demonstrates a large

  8. Excellence in Computational Biology and Informatics — EDRN Public Portal

    Science.gov (United States)

    9th Early Detection Research Network (EDRN) Scientific Workshop. Excellence in Computational Biology and Informatics: Sponsored by the EDRN Data Sharing Subcommittee Moderator: Daniel Crichton, M.S., NASA Jet Propulsion Laboratory

  9. Proposed standards for peer-reviewed publication of computer code

    Science.gov (United States)

    Computer simulation models are mathematical abstractions of physical systems. In the area of natural resources and agriculture, these physical systems encompass selected interacting processes in plants, soils, animals, or watersheds. These models are scientific products and have become important i...

  10. The efficacy of the Self-Adjusting File versus WaveOne in removal of root filling residue that remains in oval canals after the use of ProTaper retreatment files: A cone-beam computed tomography study

    Directory of Open Access Journals (Sweden)

    Ajinkya M Pawar

    2016-01-01

    Full Text Available Aim: The current ex vivo study compared the efficacy of removing root fillings using ProTaper retreatment files followed by either WaveOne reciprocating file or the Self-Adjusting File (SAF. Materials and Methods: Forty maxillary canines with single oval root canal were selected and sectioned to obtain 18-mm root segments. The root canals were instrumented with WaveOne primary files, followed by obturation using warm lateral compaction, and the sealer was allowed to fully set. The teeth were then divided into two equal groups (N = 20. Initial removal of the bulk of root filling material was performed with ProTaper retreatment files, followed by either WaveOne files (Group 1 or SAF (Group 2. Endosolv R was used as a gutta-percha softener. Preoperative and postoperative high-resolution cone-beam computed tomography (CBCT was used to measure the volume of the root filling residue that was left after the procedure. Statistical analysis was performed using t-test. Results: The mean volume of root filling residue in Group 1 was 9.4 (±0.5 mm 3 , whereas in Group 2 the residue volume was 2.6 (±0.4 mm 3 , (P < 0.001; t-test. Conclusions: When SAF was used after ProTaper retreatment files, significantly less root filling residue was left in the canals compared to when WaveOne was used.

  11. Analysis of the prosecution's filing public interest litigation%析检察机关提起公益诉讼

    Institute of Scientific and Technical Information of China (English)

    关玉新; 杨红

    2009-01-01

    检察机关提起公益诉讼,是指检察机关以国家法律监督者的身份对涉及国家利益和社会利益而无人起诉的案件,向法院提起诉讼,要求法院依法判决有关违法行为无效,并追究有关当事人的法律责任的活动.我国虽尚未建立该项制度,但是域外的成功实践为我国构建检察机关提起公益诉讼制度提供了良好的借鉴,在我国建立检察机关提起公益诉讼制度存在必要性和可行性.%The prosecution's filing public interest litigation, refers to the activities that the prosecution as supervisor of the country law prosecute the case relating to national interests and the interests of the community and no one to prosecute to the courts, asking the court to sentence the offenses in accordance with the law null, and hold the legal responsibilities of the parties. Although China has not yet established the system, the foreign successful practice provides a good reference for prosecutors to bring public interest litigation system in China. It is necessary and feasible to establish the system of the prosecution' filing public interest litigation in China.

  12. A Fault—Tolerant File Management Algorithm in Distributed Computer System “THUDS”

    Institute of Scientific and Technical Information of China (English)

    廖先Shi; 金兰

    1989-01-01

    A concurrent control with independent processes from simultaneous access to a critical section is discussed for the case where there are two distinct classes of processes known as readers and writers.The readers can share the file with one another,but the interleaved execution with readers and writers may produce undesirable conflicts.The file management algorithm proposed in this paper is the activity of avoiding these results.This algorithm not only guarantees the consistency and integrity of the shared file,but also supports optimal parallelism.The concept of dynamic virtual queue is introduced and serves the foundation for this algorithm.Our algorithm with its implicit redundancy allows software fault-tolerant technique.

  13. Communication and Computation Skills for Blind Students Attending Public Schools.

    Science.gov (United States)

    Suffolk County Board of Cooperative Educational Services 3, Dix Hills, NY.

    Outlined are evaluative and instructional procedures used by itinerant teachers of blind children in public schools to teach readiness for braille reading and writing, as well as braille reading and writing, signature writing, and the Nemeth Code of braille mathematics and scientific notation. Readiness for braille reading and writing is…

  14. Computers in Public Schools: Changing the Image with Image Processing.

    Science.gov (United States)

    Raphael, Jacqueline; Greenberg, Richard

    1995-01-01

    The kinds of educational technologies selected can make the difference between uninspired, rote computer use and challenging learning experiences. University of Arizona's Image Processing for Teaching Project has worked with over 1,000 teachers to develop image-processing techniques that provide students with exciting, open-ended opportunities for…

  15. The ACLS Survey of Scholars: Views on Publications, Computers, Libraries.

    Science.gov (United States)

    Morton, Herbert C.; Price, Anne Jamieson

    1986-01-01

    Reviews results of a survey by the American Council of Learned Societies (ACLS) of 3,835 scholars in the humanities and social sciences who are working both in colleges and universities and outside the academic community. Areas highlighted include professional reading, authorship patterns, computer use, and library use. (LRW)

  16. OK, Computer: File Sharing, the Music Industry, and Why We Need the Pirate Party

    Directory of Open Access Journals (Sweden)

    Adrian Cosstick

    2009-03-01

    Full Text Available The Pirate Party believes the state and big business are in the process of protecting stale and inefficient models of business for their own monetary benefit by limiting our right to share information. The Pirate Party suggests that they are achieving this goal through the amendment of intellectual property legislation. In the dawn of the digital era, the Pirate Party advocates that governments and multinational corporations are using intellectual property to: crack down on file sharing which limits the ability to share knowledge and information; increase the terms and length of copyright to raise profits; and build code into music files which limits their ability to be shared (Pirate Party, 2009. There are a number of ‘copyright industries’ that are affected by these issues, none more so than the music industry. Its relationship with file sharing is topical and makes an excellent case study to address the impact big business has had on intellectual property and the need for the Pirate Party’s legislative input. The essay will then examine the central issues raised by illegal file sharing. In particular, the future for record companies in an environment that increasingly demands flexibility, and whether the Pirate Party’s proposal is a viable solution to the music industry’s problems

  17. School Survey on Crime and Safety (SSOCS) 2000 Public-Use Data Files, User's Manual, and Detailed Data Documentation. [CD-ROM].

    Science.gov (United States)

    National Center for Education Statistics (ED), Washington, DC.

    This CD-ROM contains the raw, public-use data from the 2000 School Survey on Crime and Safety (SSOCS) along with a User's Manual and Detailed Data Documentation. The data are provided in SAS, SPSS, STATA, and ASCII formats. The User's Manual and the Detailed Data Documentation are provided as .pdf files. (Author)

  18. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  19. Novel Techniques for Secure Use of Public Cloud Computing Resources

    Science.gov (United States)

    2015-09-17

    of a few common standard assumptions presented in this format : Discrete Logarithm (DL)[1]: Let G be a cyclic group with generator g. Let D be the...for the system. AuthoritySetup(GP)→ MS KA, APA Each authority runs the authority setup algorithm with the global parameters GP and produces a master...secret key MS KA and some public authority parameters APA for an authority A. DomainKeyGeneration(GP, MS KA, APA , IDdomain = 〈id1, ..., id`〉, h′)→ DS K

  20. The Use of Public Computing Facilities by Library Patrons: Demography, Motivations, and Barriers

    Science.gov (United States)

    DeMaagd, Kurt; Chew, Han Ei; Huang, Guanxiong; Khan, M. Laeeq; Sreenivasan, Akshaya; LaRose, Robert

    2013-01-01

    Public libraries play an important part in the development of a community. Today, they are seen as more than store houses of books; they are also responsible for the dissemination of online, and offline information. Public access computers are becoming increasingly popular as more and more people understand the need for internet access. Using a…

  1. A Computer-Assisted Instruction in Teaching Abstract Statistics to Public Affairs Undergraduates

    Science.gov (United States)

    Ozturk, Ali Osman

    2012-01-01

    This article attempts to demonstrate the applicability of a computer-assisted instruction supported with simulated data in teaching abstract statistical concepts to political science and public affairs students in an introductory research methods course. The software is called the Elaboration Model Computer Exercise (EMCE) in that it takes a great…

  2. A literature review of neck pain associated with computer use: public health implications

    OpenAIRE

    2008-01-01

    Prolonged use of computers during daily work activities and recreation is often cited as a cause of neck pain. This review of the literature identifies public health aspects of neck pain as associated with computer use. While some retrospective studies support the hypothesis that frequent computer operation is associated with neck pain, few prospective studies reveal causal relationships. Many risk factors are identified in the literature. Primary prevention strategies have largely been confi...

  3. Computational Ecology and Software (http://www.iaees.org/publications/journals/ces/online-version.asp

    Directory of Open Access Journals (Sweden)

    ces@iaees.org

    Full Text Available Computational Ecology and Software ISSN 2220-721X URL: http://www.iaees.org/publications/journals/ces/online-version.asp RSS: http://www.iaees.org/publications/journals/ces/rss.xml E-mail: ces@iaees.org Editor-in-Chief: WenJun Zhang Aims and Scope COMPUTATIONAL ECOLOGY AND SOFTWARE (ISSN 2220-721X is an open access, peer-reviewed online journal that considers scientific articles in all different areas of computational ecology. It is the transactions of the International Society of Computational Ecology. The journal is concerned with the ecological researches, constructions and applications of theories and methods of computational sciences including computational mathematics, computational statistics and computer science. It features the simulation, approximation, prediction, recognition, and classification of ecological issues. Intensive computation is one of the major stresses of the journal. The journal welcomes research articles, short communications, review articles, perspectives, and book reviews. The journal also supports the activities of the International Society of Computational Ecology. The topics to be covered by CES include, but are not limited to: •Computation intensive methods, numerical and optimization methods, differential and difference equation modeling and simulation, prediction, recognition, classification, statistical computation (Bayesian computing, randomization, bootstrapping, Monte Carlo techniques, stochastic process, etc., agent-based modeling, individual-based modeling, artificial neural networks, knowledge based systems, machine learning, genetic algorithms, data exploration, network analysis and computation, databases, ecological modeling and computation using Geographical Information Systems, satellite imagery, and other computation intensive theories and methods. •Artificial ecosystems, artificial life, complexity of ecosystems and virtual reality. •The development, evaluation and validation of software and

  4. Social science. Publication bias in the social sciences: unlocking the file drawer.

    Science.gov (United States)

    Franco, Annie; Malhotra, Neil; Simonovits, Gabor

    2014-09-19

    We studied publication bias in the social sciences by analyzing a known population of conducted studies--221 in total--in which there is a full accounting of what is published and unpublished. We leveraged Time-sharing Experiments in the Social Sciences (TESS), a National Science Foundation-sponsored program in which researchers propose survey-based experiments to be run on representative samples of American adults. Because TESS proposals undergo rigorous peer review, the studies in the sample all exceed a substantial quality threshold. Strong results are 40 percentage points more likely to be published than are null results and 60 percentage points more likely to be written up. We provide direct evidence of publication bias and identify the stage of research production at which publication bias occurs: Authors do not write up and submit null findings.

  5. The Importance of Computer Science for Public Health Training: An Opportunity and Call to Action.

    Science.gov (United States)

    Kunkle, Sarah; Christie, Gillian; Yach, Derek; El-Sayed, Abdulrahman M

    2016-01-01

    A century ago, the Welch-Rose Report established a public health education system in the United States. Since then, the system has evolved to address emerging health needs and integrate new technologies. Today, personalized health technologies generate large amounts of data. Emerging computer science techniques, such as machine learning, present an opportunity to extract insights from these data that could help identify high-risk individuals and tailor health interventions and recommendations. As these technologies play a larger role in health promotion, collaboration between the public health and technology communities will become the norm. Offering public health trainees coursework in computer science alongside traditional public health disciplines will facilitate this evolution, improving public health's capacity to harness these technologies to improve population health.

  6. The File Drawer Effect and Publication Rates in Menstrual Cycle Research.

    Science.gov (United States)

    Sommer, Barbara

    1987-01-01

    Surveyed investigators (N=91) studying the menstrual cycle. Showed the assumption that researchers are unable to publish studies with nonsignificant findings to be unwarranted. Found much of the research did not lend itself to a hypothesis-testing model. A more important contribution to the likelihood of publication was research productivity.…

  7. A User’s Index to CRREL Land Treatment Computer Programs and Data Files.

    Science.gov (United States)

    1982-11-01

    file in raw form. It reads from DATAMETL. NUMERO BASIC 2 Program to print out a user-specifiable section of the heavy metals data in a tabular form. It...reads from METAL and DATAMETL. NUMERO BASIC 2 0 Same as NUMERO , except that there is a printing limit of 11 samples. UPETAL BASIC 16 Program to update...DATA EXPER>STATS>NTNSOCT 19 NUMBER BASIC EXPER>METALS>DART>NUMBER 13 ’ NUMERO BASIC EXPER>METALS>DART> NUMERO 13 NUMEROL BASIC EXPER>METALS>DART

  8. Comp Plan: A computer program to generate dose and radiobiological metrics from dose-volume histogram files.

    Science.gov (United States)

    Holloway, Lois Charlotte; Miller, Julie-Anne; Kumar, Shivani; Whelan, Brendan M; Vinod, Shalini K

    2012-01-01

    Treatment planning studies often require the calculation of a large number of dose and radiobiological metrics. To streamline these calculations, a computer program called Comp Plan was developed using MATLAB. Comp Plan calculates common metrics, including equivalent uniform dose, tumor control probability, and normal tissue complication probability from dose-volume histogram data. The dose and radiobiological metrics can be calculated for the original data or for an adjusted fraction size using the linear quadratic model. A homogeneous boost dose can be added to a given structure if desired. The final output is written to an Excel file in a format convenient for further statistical analysis. Comp Plan was verified by independent calculations. A lung treatment planning study comparing 45 plans for 7 structures using up to 6 metrics for each structure was successfully analyzed within approximately 5 minutes with Comp Plan. The code is freely available from the authors on request.

  9. A Comparative Assessment of Computer Literacy of Private and Public Secondary School Students in Lagos State, Nigeria

    Science.gov (United States)

    Osunwusi, Adeyinka Olumuyiwa; Abifarin, Michael Segun

    2013-01-01

    The aim of this study was to conduct a comparative assessment of computer literacy of private and public secondary school students. Although the definition of computer literacy varies widely, this study treated computer literacy in terms of access to, and use of, computers and the internet, basic knowledge and skills required to use computers and…

  10. 43 CFR 4.1362 - Where to file; when to file.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Where to file; when to file. 4.1362... file; when to file. (a) The request for review shall be filed with the Hearings Division, Office of... bear the expense for this service. (b) Failure to file a request for review within the time...

  11. PCF File Format.

    Energy Technology Data Exchange (ETDEWEB)

    Thoreson, Gregory G [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    PCF files are binary files designed to contain gamma spectra and neutron count rates from radiation sensors. It is the native format for the GAmma Detector Response and Analysis Software (GADRAS) package [1]. It can contain multiple spectra and information about each spectrum such as energy calibration. This document outlines the format of the file that would allow one to write a computer program to parse and write such files.

  12. Secure encapsulation and publication of biological services in the cloud computing environment.

    Science.gov (United States)

    Zhang, Weizhe; Wang, Xuehui; Lu, Bo; Kim, Tai-hoon

    2013-01-01

    Secure encapsulation and publication for bioinformatics software products based on web service are presented, and the basic function of biological information is realized in the cloud computing environment. In the encapsulation phase, the workflow and function of bioinformatics software are conducted, the encapsulation interfaces are designed, and the runtime interaction between users and computers is simulated. In the publication phase, the execution and management mechanisms and principles of the GRAM components are analyzed. The functions such as remote user job submission and job status query are implemented by using the GRAM components. The services of bioinformatics software are published to remote users. Finally the basic prototype system of the biological cloud is achieved.

  13. A computer scientist’s evaluation of publically available hardware Trojan benchmarks

    OpenAIRE

    Slayback, Scott M.

    2015-01-01

    Approved for public release; distribution is unlimited Dr. Hassan Salmani and Dr. Mohammed Tehranipoor have developed a collection of publically available hardware Trojans, meant to be used as common benchmarks for the analysis of detection and mitigation techniques. In this thesis, we evaluate a selection of these Trojans from the perspective of a computer scientist with limited electrical engineering background. Note that this thesis is also intended to serve as a supplement to the exist...

  14. Verification of data files of TREF-computer program; TREF-ohjelmiston ohjaustiedostojen soveltuvuustutkimus

    Energy Technology Data Exchange (ETDEWEB)

    Ruottu, S.; Halme, A.; Ruottu, A. [Einco Oy, Karhula (Finland)

    1996-12-01

    Originally the aim of Y43 project was to verify TREF data files for several different processes. However, it appeared that deficient or missing coordination between experimental and theoretical works made meaningful verifications impossible in some cases. Therefore verification calculations were focused on catalytic cracking reactor which was developed by Neste. The studied reactor consisted of prefluidisation and reaction zones. Verification calculations concentrated mainly on physical phenomena like vaporization near oil injection zone. The main steps of the cracking process can be described as follows oil (liquid) -> oil (gas) -> oil (catal) -> product (catal) + char (catal) -> product (gas). Catalytic nature of cracking reaction was accounted by defining the cracking pseudoreaction into catalyst phase. This simplified reaction model was valid only for vaporization zone. Applied fluid dynamic theory was based on the results of EINCO`s earlier LIEKKI-projects. (author)

  15. Democratizing Computer Science Knowledge: Transforming the Face of Computer Science through Public High School Education

    Science.gov (United States)

    Ryoo, Jean J.; Margolis, Jane; Lee, Clifford H.; Sandoval, Cueponcaxochitl D. M.; Goode, Joanna

    2013-01-01

    Despite the fact that computer science (CS) is the driver of technological innovations across all disciplines and aspects of our lives, including participatory media, high school CS too commonly fails to incorporate the perspectives and concerns of low-income students of color. This article describes a partnership program -- Exploring Computer…

  16. COMPUTING

    CERN Multimedia

    M. Kasemann

    CCRC’08 challenges and CSA08 During the February campaign of the Common Computing readiness challenges (CCRC’08), the CMS computing team had achieved very good results. The link between the detector site and the Tier0 was tested by gradually increasing the number of parallel transfer streams well beyond the target. Tests covered the global robustness at the Tier0, processing a massive number of very large files and with a high writing speed to tapes.  Other tests covered the links between the different Tiers of the distributed infrastructure and the pre-staging and reprocessing capacity of the Tier1’s: response time, data transfer rate and success rate for Tape to Buffer staging of files kept exclusively on Tape were measured. In all cases, coordination with the sites was efficient and no serious problem was found. These successful preparations prepared the ground for the second phase of the CCRC’08 campaign, in May. The Computing Software and Analysis challen...

  17. An Exploratory Study of Malaysian Publication Productivity in Computer Science and Information Technology.

    Science.gov (United States)

    Gu, Yinian

    2002-01-01

    Explores the Malaysian computer science and information technology publication productivity as indicated by data collected from three Web-based databases. Relates possible reasons for the amount and pattern of contributions to the size of researcher population, the availability of refereed scholarly journals, and the total expenditure allocated to…

  18. A Massively Parallel Computational Method of Reading Index Files for SOAPsnv.

    Science.gov (United States)

    Zhu, Xiaoqian; Peng, Shaoliang; Liu, Shaojie; Cui, Yingbo; Gu, Xiang; Gao, Ming; Fang, Lin; Fang, Xiaodong

    2015-12-01

    SOAPsnv is the software used for identifying the single nucleotide variation in cancer genes. However, its performance is yet to match the massive amount of data to be processed. Experiments reveal that the main performance bottleneck of SOAPsnv software is the pileup algorithm. The original pileup algorithm's I/O process is time-consuming and inefficient to read input files. Moreover, the scalability of the pileup algorithm is also poor. Therefore, we designed a new algorithm, named BamPileup, aiming to improve the performance of sequential read, and the new pileup algorithm implemented a parallel read mode based on index. Using this method, each thread can directly read the data start from a specific position. The results of experiments on the Tianhe-2 supercomputer show that, when reading data in a multi-threaded parallel I/O way, the processing time of algorithm is reduced to 3.9 s and the application program can achieve a speedup up to 100×. Moreover, the scalability of the new algorithm is also satisfying.

  19. A computational simulation study on the acoustic pressure generated by a dental endosonic file: effects of intensity, file shape and volume.

    Science.gov (United States)

    Tiong, T Joyce; Price, Gareth J; Kanagasingam, Shalini

    2014-09-01

    One of the uses of ultrasound in dentistry is in the field of endodontics (i.e. root canal treatment) in order to enhance cleaning efficiency during the treatment. The acoustic pressures generated by the oscillation of files in narrow channels has been calculated using the COMSOL simulation package. Acoustic pressures in excess of the cavitation threshold can be generated and higher values were found in narrower channels. This parallels experimental observations of sonochemiluminescence. The effect of varying the channel width and length and the dimensions and shape of the file are reported. As well as explaining experimental observations, the work provides a basis for the further development and optimisation of the design of endosonic files. Copyright © 2014 Elsevier B.V. All rights reserved.

  20. Learning From Engineering and Computer Science About Communicating The Field To The Public

    Science.gov (United States)

    Moore, S. L.; Tucek, K.

    2014-12-01

    The engineering and computer science community has taken the lead in actively informing the public about their discipline, including the societal contributions and career opportunities. These efforts have been intensified in regards to informing underrepresented populations in STEM about engineering and computer science. Are there lessons to be learned by the geoscience community in communicating the societal impacts and career opportunities in the geosciences, especially in regards to broadening participation and meeting Next Generation Science Standards? An estimated 35 percent increase in the number of geoscientist jobs in the United States forecasted for the period between 2008 and 2018, combined with majority populations becoming minority populations, make it imperative that we improve how we increase the public's understanding of the geosciences and how we present our message to targeted populations. This talk will look at recommendations from the National Academy of Engineering's Changing the Conversation: Messages for Improving the Public Understanding of Engineering, and communication strategies by organizations such as Code.org, to highlight practices that the geoscience community can adopt to increase public awareness of the societal contributions of the geosciences, the career opportunities in the geosciences, and the importance of the geosciences in the Next Generation Science Standards. An effort to communicate geoscience to the public, Earth is Calling, will be compared and contrasted to these efforts, and used as an example of how geological societies and other organizations can engage the general public and targeted groups about the geosciences.

  1. Cone-beam Computed Tomographic Assessment of Canal Centering Ability and Transportation after Preparation with Twisted File and Bio RaCe Instrumentation.

    Directory of Open Access Journals (Sweden)

    Kiamars Honardar

    2014-08-01

    Full Text Available Use of rotary Nickel-Titanium (NiTi instruments for endodontic preparation has introduced a new era in endodontic practice, but this issue has undergone dramatic modifications in order to achieve improved shaping abilities. Cone-beam computed tomography (CBCT has made it possible to accurately evaluate geometrical changes following canal preparation. This study was carried out to compare canal centering ability and transportation of Twisted File and BioRaCe rotary systems by means of cone-beam computed tomography.Thirty root canals from freshly extracted mandibular and maxillary teeth were selected. Teeth were mounted and scanned before and after preparation by CBCT at different apical levels. Specimens were divided into 2 groups of 15. In the first group Twisted File and in the second, BioRaCe was used for canal preparation. Canal transportation and centering ability after preparation were assessed by NNT Viewer and Photoshop CS4 software. Statistical analysis was performed using t-test and two-way ANOVA.All samples showed deviations from the original axes of the canals. No significant differences were detected between the two rotary NiTi instruments for canal centering ability in all sections. Regarding canal transportation however, a significant difference was seen in the BioRaCe group at 7.5mm from the apex.Under the conditions of this in vitro study, Twisted File and BioRaCe rotary NiTi files retained original canal geometry.

  2. 76 FR 70719 - Public Utility District No. 1 of Snohomish County; Notice of Intent To File License Application...

    Science.gov (United States)

    2011-11-15

    ... by the project works or located within the project boundary. g. Filed Pursuant to: 18 CFR 5.3 of the... the Division of Hydropower Licensing approved Snohomish PUD's request to use the Traditional Licensing...

  3. Leveraging Cloud Computing to Address Public Health Disparities: An Analysis of the SPHPS.

    Science.gov (United States)

    Jalali, Arash; Olabode, Olusegun A; Bell, Christopher M

    2012-01-01

    As the use of certified electronic health record technology (CEHRT) has continued to gain prominence in hospitals and physician practices, public health agencies and health professionals have the ability to access health data through health information exchanges (HIE). With such knowledge health providers are well positioned to positively affect population health, and enhance health status or quality-of-life outcomes in at-risk populations. Through big data analytics, predictive analytics and cloud computing, public health agencies have the opportunity to observe emerging public health threats in real-time and provide more effective interventions addressing health disparities in our communities. The Smarter Public Health Prevention System (SPHPS) provides real-time reporting of potential public health threats to public health leaders through the use of a simple and efficient dashboard and links people with needed personal health services through mobile platforms for smartphones and tablets to promote and encourage healthy behaviors in our communities. The purpose of this working paper is to evaluate how a secure virtual private cloud (VPC) solution could facilitate the implementation of the SPHPS in order to address public health disparities.

  4. HEDIS Public Use File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Healthcare Effectiveness Data and Information Set (HEDIS) is a tool used by more than 90 percent of Americas health plans to measure performance on important...

  5. Taking the High Ground: A Case for Department of Defense Application of Public Cloud Computing

    Science.gov (United States)

    2011-06-01

    IT cannot be sustained in a declining budget environment with users demanding better services. Wyld captures the essence of much of the problem for...the DoD laboratory data centers into model versions of public providers. An open source project, called Eucalyptus (http://www.eucalyptus.com), would...be an excellent starting point for such a project. Eucalyptus is a software plat- form for implementing private cloud computing solutions on top of

  6. Informed public choices for low-carbon electricity portfolios using a computer decision tool.

    Science.gov (United States)

    Mayer, Lauren A Fleishman; Bruine de Bruin, Wändi; Morgan, M Granger

    2014-04-01

    Reducing CO2 emissions from the electricity sector will likely require policies that encourage the widespread deployment of a diverse mix of low-carbon electricity generation technologies. Public discourse informs such policies. To make informed decisions and to productively engage in public discourse, citizens need to understand the trade-offs between electricity technologies proposed for widespread deployment. Building on previous paper-and-pencil studies, we developed a computer tool that aimed to help nonexperts make informed decisions about the challenges faced in achieving a low-carbon energy future. We report on an initial usability study of this interactive computer tool. After providing participants with comparative and balanced information about 10 electricity technologies, we asked them to design a low-carbon electricity portfolio. Participants used the interactive computer tool, which constrained portfolio designs to be realistic and yield low CO2 emissions. As they changed their portfolios, the tool updated information about projected CO2 emissions, electricity costs, and specific environmental impacts. As in the previous paper-and-pencil studies, most participants designed diverse portfolios that included energy efficiency, nuclear, coal with carbon capture and sequestration, natural gas, and wind. Our results suggest that participants understood the tool and used it consistently. The tool may be downloaded from http://cedmcenter.org/tools-for-cedm/informing-the-public-about-low-carbon-technologies/ .

  7. 6th International Workshop on Computer-Aided Scheduling of Public Transport

    CERN Document Server

    Branco, Isabel; Paixão, José

    1995-01-01

    This proceedings volume consists of papers presented at the Sixth International Workshop on Computer-Aided Scheduling of Public Transpon, which was held at the Fund~lio Calouste Gulbenkian in Lisbon from July 6th to 9th, 1993. In the tradition of alternating Workshops between North America and Europe - Chicago (1975), Leeds (1980), Montreal (1983), Hamburg (1987) and again Montreal (1990), the European city of Lisbon was selected as the venue for the Workshop in 1993. As in earlier Workshops, the central theme dealt with vehicle and duty scheduling problems and the employment of operations-research-based software systems for operational planning in public transport. However, as was initiated in Hamburg in 1987, the scope of this Workshop was broadened to include topics in related fields. This fundamental alteration was an inevitable consequence of the growing demand over the last decade for solutions to the complete planning process in public transport through integrated systems. Therefore, the program of thi...

  8. Radiological Protection in Cone Beam Computed Tomography (CBCT). ICRP Publication 129.

    Science.gov (United States)

    Rehani, M M; Gupta, R; Bartling, S; Sharp, G C; Pauwels, R; Berris, T; Boone, J M

    2015-07-01

    The objective of this publication is to provide guidance on radiological protection in the new technology of cone beam computed tomography (CBCT). Publications 87 and 102 dealt with patient dose management in computed tomography (CT) and multi-detector CT. The new applications of CBCT and the associated radiological protection issues are substantially different from those of conventional CT. The perception that CBCT involves lower doses was only true in initial applications. CBCT is now used widely by specialists who have little or no training in radiological protection. This publication provides recommendations on radiation dose management directed at different stakeholders, and covers principles of radiological protection, training, and quality assurance aspects. Advice on appropriate use of CBCT needs to be made widely available. Advice on optimisation of protection when using CBCT equipment needs to be strengthened, particularly with respect to the use of newer features of the equipment. Manufacturers should standardise radiation dose displays on CBCT equipment to assist users in optimisation of protection and comparisons of performance. Additional challenges to radiological protection are introduced when CBCT-capable equipment is used for both fluoroscopy and tomography during the same procedure. Standardised methods need to be established for tracking and reporting of patient radiation doses from these procedures. The recommendations provided in this publication may evolve in the future as CBCT equipment and applications evolve. As with previous ICRP publications, the Commission hopes that imaging professionals, medical physicists, and manufacturers will use the guidelines and recommendations provided in this publication for implementation of the Commission's principle of optimisation of protection of patients and medical workers, with the objective of keeping exposures as low as reasonably achievable, taking into account economic and societal factors, and

  9. THE USE OF COMPUTER APPLICATIONS IN THE STUDY OF ROMANIA'S PUBLIC DEBT

    Directory of Open Access Journals (Sweden)

    Popeanga Vasile

    2011-07-01

    Full Text Available Total public debt represents all monetary obligations of the state (government, public institutions, financial, administrative-territorial units at a time, resulting from internal and external loans (in lei and foreign currencies contracted on short, medium and long term, and the state treasury and its own obligations for the amounts advanced temporarily to cover the budget deficit. Loans may be contracted by the state through the Ministry of Finance, in his own name or guaranteed by it. Public debt is expressed in local currency or foreign currency, depending on where the contracts and loan conditions. In order to evaluate Romania's public debt, obligations denominated in another currency than the national currency is calculated using the exchange rate of National Bank of Romania. Also, total public debt of a country can be expressed in absolute values (to know the load on that country's economy which is subject to its creditors, the relative values as a percentage of GDP (to allow comparison over time and between countries and the average size per capita (to allow comparisons and analysis in time and space. Total public debt is calculated and separately manages its two forms, namely domestic public debt and external public debt. Ministry of Finance shall prepare and submit annually to the Government for approval and to Parliament for information, report on public debt, which contains information on government debt portfolio, debt service, public indebtedness indicators and information about primary and secondary market securities state and how to implement the medium-term strategy in managing government debt for the previous year. In order to make comparisons quick and effective on public debt dynamics in Romania, Excel 2010 has new features such as charts and sparkline slicers features which can help discover trends and statistics in accordance with existing data. The aim of this article is accurate assessment of Romania's public debt and its

  10. 78 FR 54453 - Notice of Public Meeting-Intersection of Cloud Computing and Mobility Forum and Workshop

    Science.gov (United States)

    2013-09-04

    ... National Institute of Standards and Technology Notice of Public Meeting--Intersection of Cloud Computing...-mobility.cfm . SUPPLEMENTARY INFORMATION: NIST hosted six prior Cloud Computing Forum & Workshop events in..., portability, and security, discuss the Federal Government's experience with cloud computing, report on...

  11. Evaluation of the Efficacy of TRUShape and Reciproc File Systems in the Removal of Root Filling Material: An Ex Vivo Micro-Computed Tomographic Study.

    Science.gov (United States)

    de Siqueira Zuolo, Arthur; Zuolo, Mario Luis; da Silveira Bueno, Carlos Eduardo; Chu, Rene; Cunha, Rodrigo Sanches

    2016-02-01

    The purpose of this study was to evaluate the efficacy of TRUShape (Dentsply Tulsa Dental Specialties, Tulsa, OK) compared with the Reciproc file (VDW, Munich, Germany) in the removal of filling material from oval canals filled with 2 different sealers and differences in the working time. Sixty-four mandibular canines with oval canals were prepared and divided into 4 groups (n = 16). Half of the specimens were filled with gutta-percha and pulp canal sealer (PCS), and the remainders were filled with gutta-percha and bioceramic sealer (BCS). The specimens were retreated using either the Reciproc or TRUShape files. A micro-computed tomographic scanner was used to assess filling material removal, and the time taken for removal was also recorded. Data were analyzed using the Kruskal-Wallis and Mann-Whitney U tests. The mean volume of the remaining filling material was similar when comparing both files (P ≥ .05). However, in the groups filled with BCS, the percentage of remaining filling material was higher than in the groups filled with PCS (P material when comparing both files system; however, Reciproc was faster than TRUShape. BCS groups exhibited significantly more remaining filling material in the canals and required more time for retreatment. Remaining filling material was observed in all samples regardless of the technique or sealer used. Copyright © 2016 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  12. Fact File

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    @@ Are delegates selected according to predetermined quotas of ethnicity and gender? The delegates who attend the CPC National Congress represent a broad spectrum of Party members.They include leading officials at various levels, and rank and file Party members working at the front line of production and those from more regular walks of life.A large proportion of the delegates are model Party members who have made outstanding contributions in various sectors and undertakings of the economy, science and technology, national defense, politics and law, education, public relations, public health, culture and sports.

  13. Structure and Application pf WAV File

    Institute of Scientific and Technical Information of China (English)

    Guo,Xingji

    2005-01-01

    As regards audio digitization, the researcher introduced several computer process means of audio information, and then, presented application patterns based on WAV file after analyzing thoroughly the structure of the widely used WAV File in computer application field.

  14. [Design and study of parallel computing environment of Monte Carlo simulation for particle therapy planning using a public cloud-computing infrastructure].

    Science.gov (United States)

    Yokohama, Noriya

    2013-07-01

    This report was aimed at structuring the design of architectures and studying performance measurement of a parallel computing environment using a Monte Carlo simulation for particle therapy using a high performance computing (HPC) instance within a public cloud-computing infrastructure. Performance measurements showed an approximately 28 times faster speed than seen with single-thread architecture, combined with improved stability. A study of methods of optimizing the system operations also indicated lower cost.

  15. An Overview of a Decade of Journal Publications about Culture and Human-Computer Interaction (HCI)

    Science.gov (United States)

    Clemmensen, Torkil; Roese, Kerstin

    In this paper, we analyze the concept of human-computer interaction in cultural and national contexts. Building and extending upon the framework for understanding research in usability and culture by Honold [3], we give an overview of publications in culture and HCI between 1998 and 2008, with a narrow focus on high-level journal publications only. The purpose is to review current practice in how cultural HCI issues are studied, and to analyse problems with the measures and interpretation of this studies. We find that Hofstede's cultural dimensions has been the dominating model of culture, participants have been picked because they could speak English, and most studies have been large scale quantitative studies. In order to balance this situation, we recommend that more researchers and practitioners do qualitative, empirical work studies.

  16. 76 FR 39757 - Filing Procedures

    Science.gov (United States)

    2011-07-06

    ... an accurate filing history can be maintained. (b) Changes to user information other than the Firm... computer or internet resources. If the request is granted, the Secretary will promptly inform you and... applicable hardware and software requirements for electronic filing. (2) To file or submit a document in...

  17. 43 CFR 4.1371 - Who may file, where to file, when to file.

    Science.gov (United States)

    2010-10-01

    ... of proposed suspension or rescission under 30 CFR 773.22 or a notice of suspension or rescission under 30 CFR 773.23 may file a request for review with the Hearings Division, Office of Hearings and... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Who may file, where to file, when to...

  18. Public-Resource Computing: Un nuevo paradigma para la computación y la ciencia

    OpenAIRE

    2006-01-01

    En este artículo se explora el concepto de Computación de Recursos Públicos (Public-Resource Computing), una idea que se ha venido desarrollando con gran éxito desde hace algunos años en la comunidad científica y que consiste en el aprovechamiento de los recursos de computación que se encuentran disponibles en los millones de PC que existen en el mundo conectados a internet. Se discute el proyecto SETI@home, el más exitoso representante de este concepto, y se describe la plataforma BOINC (Ber...

  19. Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review

    Directory of Open Access Journals (Sweden)

    Sumit Goyal

    2014-02-01

    Full Text Available These days cloud computing is booming like no other technology. Every organization whether it's small, mid-sized or big, wants to adapt this cutting edge technology for its business. As cloud technology becomes immensely popular among these businesses, the question arises: Which cloud model to consider for your business? There are four types of cloud models available in the market: Public, Private, Hybrid and Community. This review paper answers the question, which model would be most beneficial for your business. All the four models are defined, discussed and compared with the benefits and pitfalls, thus giving you a clear idea, which model to adopt for your organization.

  20. 78 FR 25071 - Combined Notice of Filings

    Science.gov (United States)

    2013-04-29

    ... Public Convenience and Necessity to Lease Pipeline Facilities and for Related Authorizations. Filed Date... abandon pipeline facility by transfer and amending certificated of public convenience and necessity....

  1. Sensitivity Data File Formats

    Energy Technology Data Exchange (ETDEWEB)

    Rearden, Bradley T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-04-01

    The format of the TSUNAMI-A sensitivity data file produced by SAMS for cases with deterministic transport solutions is given in Table 6.3.A.1. The occurrence of each entry in the data file is followed by an identification of the data contained on each line of the file and the FORTRAN edit descriptor denoting the format of each line. A brief description of each line is also presented. A sample of the TSUNAMI-A data file for the Flattop-25 sample problem is provided in Figure 6.3.A.1. Here, only two profiles out of the 130 computed are shown.

  2. FCJ-133 The Scripted Spaces of Urban Ubiquitous Computing: The experience, poetics, and politics of public scripted space

    Directory of Open Access Journals (Sweden)

    Christian Ulrik Andersen

    2011-12-01

    Full Text Available This article proposes and introduces the concept of ‘scripted space’ as a new perspective on ubiquitous computing in urban environments. Drawing on urban history, computer games, and a workshop study of the city of Lund the article discusses the experience of digitally scripted spaces, and their relation to the history of public spaces. In conclusion, the article discusses the potential for employing scripted spaces as a reinvigoration of urban public space.

  3. The Impact and Challenges of Cloud Computing Adoption on Public Universities in Southwestern Nigeria

    Directory of Open Access Journals (Sweden)

    Oyeleye Christopher Akin

    2014-08-01

    Full Text Available This study investigates the impact and challenges of the adoption of cloud computing by public universities in the Southwestern part of Nigeria. A sample size of 100 IT staff, 50 para-IT staff and 50 students were selected in each university using stratified sampling techniques with the aid of well-structured questionnaires. Microsoft excel was used to capture the data while frequency and percentage distributions were used to analyze it. In all, 2, 000 copies of the questionnaire were administered to the ten (10 public universities in the southwestern part of Nigeria while 1742 copies were returned which represents a respondent rate of 87.1%. The result of the findings revealed that the adoption of cloud computing has a significant impact on cost effectiveness, enhanced availability, low environmental impact, reduced IT complexities, mobility, scalability, increased operability and reduced investment in physical asset However, the major challenges confronting the adoption of cloud are data insecurity, regulatory compliance concerns, lock-in and privacy concerns. This paper concludes by recommending strategies to manage the identified challenges in the study area.

  4. Public library computer training for older adults to access high-quality Internet health information.

    Science.gov (United States)

    Xie, Bo; Bugg, Julie M

    2009-09-01

    An innovative experiment to develop and evaluate a public library computer training program to teach older adults to access and use high-quality Internet health information involved a productive collaboration among public libraries, the National Institute on Aging and the National Library of Medicine of the National Institutes of Health (NIH), and a Library and Information Science (LIS) academic program at a state university. One hundred and thirty-one older adults aged 54-89 participated in the study between September 2007 and July 2008. Key findings include: a) participants had overwhelmingly positive perceptions of the training program; b) after learning about two NIH websites (http://nihseniorhealth.gov and http://medlineplus.gov) from the training, many participants started using these online resources to find high quality health and medical information and, further, to guide their decision-making regarding a health- or medically-related matter; and c) computer anxiety significantly decreased (p libraries, LIS academic programs, and other organizations interested in providing similar programs in their communities.

  5. An easy and effective approach to manage radiologic portable document format (PDF) files using iTunes.

    Science.gov (United States)

    Qian, Li Jun; Zhou, Mi; Xu, Jian Rong

    2008-07-01

    The objective of this article is to explain an easy and effective approach for managing radiologic files in portable document format (PDF) using iTunes. PDF files are widely used as a standard file format for electronic publications as well as for medical online documents. Unfortunately, there is a lack of powerful software to manage numerous PDF documents. In this article, we explain how to use the hidden function of iTunes (Apple Computer) to manage PDF documents as easily as managing music files.

  6. High-performance parallel computing in the classroom using the public goods game as an example

    Science.gov (United States)

    Perc, Matjaž

    2017-07-01

    The use of computers in statistical physics is common because the sheer number of equations that describe the behaviour of an entire system particle by particle often makes it impossible to solve them exactly. Monte Carlo methods form a particularly important class of numerical methods for solving problems in statistical physics. Although these methods are simple in principle, their proper use requires a good command of statistical mechanics, as well as considerable computational resources. The aim of this paper is to demonstrate how the usage of widely accessible graphics cards on personal computers can elevate the computing power in Monte Carlo simulations by orders of magnitude, thus allowing live classroom demonstration of phenomena that would otherwise be out of reach. As an example, we use the public goods game on a square lattice where two strategies compete for common resources in a social dilemma situation. We show that the second-order phase transition to an absorbing phase in the system belongs to the directed percolation universality class, and we compare the time needed to arrive at this result by means of the main processor and by means of a suitable graphics card. Parallel computing on graphics processing units has been developed actively during the last decade, to the point where today the learning curve for entry is anything but steep for those familiar with programming. The subject is thus ripe for inclusion in graduate and advanced undergraduate curricula, and we hope that this paper will facilitate this process in the realm of physics education. To that end, we provide a documented source code for an easy reproduction of presented results and for further development of Monte Carlo simulations of similar systems.

  7. Digital utopias and real cities—computer-generated images in re-design of public space

    Directory of Open Access Journals (Sweden)

    Marianna Michałowska

    2015-12-01

    Full Text Available Virtual environments are seen nowadays as extensions of our physical activities in the city. Are people, however, aware what the digitally mediated cities they live in are? The starting point of my paper is a question of how computer-generated images (CGIs influence human perception of real space. I am interested in the conflict between a vision and reality, which occurs when an architectural project materialises in a public space and is subsequently rejected by the inhabitants. To explain this conflict, I will use the notion of digital utopias and compare CGIs with the great tradition of “paper” architecture. I will analyse two case studies from a medium-sized Polish city—Poznań. The first case is a redevelopment of the Main Railway Station; the second is a re-design of a local square in Poznań. The analysis focuses on the ambiguity of CGIs used to advertise new investments. The Station in the phase of digital visualisation was appreciated by the Poznań inhabitants but when the project was finally realised, strong criticism of its users followed. The second one provoked public protests already in the phase of visualisation. In conclusion, I state that the concept of agonistic public spaces should be expanded and its virtual dimension should be taken into consideration as well. When dealing with hyper-realistic CGIs, we experience a certain utopia. Confronted with their material execution, we often experience dystopian disillusion which stirs us into action.

  8. Introduction to Hadoop Distributed File System

    Directory of Open Access Journals (Sweden)

    Vaibhav Gopal korat

    2012-04-01

    Full Text Available HDFS is a distributed file system designed to hold very large amounts of data (terabytes or even petabytes, and provide high-throughput access to this information. Files are stored in a redundant fashion across multiple machines to ensure their durability to failure and high availability to very parallel applications. This paper includes the step by step introduction to the file system to distributed file system and to the Hadoop Distributed File System. Section I introduces What is file System, Need of File System, Conventional File System, its advantages, Need of Distributed File System, What is Distributed File System and Benefits of Distributed File System. Also the analysis of large dataset and comparison of mapreducce with RDBMS, HPC and Grid Computing communities have been doing large-scale data processing for years. Sections II introduce the concept of Hadoop Distributed File System. Lastly section III contains Conclusion followed with the References.

  9. Computing what the public wants: some issues in road safety cost-benefit analysis.

    Science.gov (United States)

    Hauer, Ezra

    2011-01-01

    In road safety, as in other fields, cost-benefit analysis (CBA) is used to justify the investment of public money and to establish priority between projects. It amounts to a computation by which 'few' - the CB analysts - aim to determine what the 'many' - those on behalf of which the choice is to be made - would choose. The question is whether there are grounds to believe that the tool fits the aim. I argue that the CBA tool is deficient. First, because estimates of the value of statistical life and injury on which the CBA computation rests are all over the place, inconsistent with the value of time estimates, and government guidance on the matter appears to be arbitrary. Second, because the premises of New Welfare Economics on which the CBA is founded apply only in circumstances which, in road safety, are rare. Third, because the CBA requires the computation of present values which must be questioned when the discounting is of future lives and of time. Because time savings are valued too highly when compared to life and because discounting tends to unjustifiably diminish the value of lives saved in the future, the CBA tends to bias decisions against investment in road safety.

  10. Developing a personal computer-based data visualization system using public domain software

    Science.gov (United States)

    Chen, Philip C.

    1999-03-01

    The current research will investigate the possibility of developing a computing-visualization system using a public domain software system built on a personal computer. Visualization Toolkit (VTK) is available on UNIX and PC platforms. VTK uses C++ to build an executable. It has abundant programming classes/objects that are contained in the system library. Users can also develop their own classes/objects in addition to those existing in the class library. Users can develop applications with any of the C++, Tcl/Tk, and JAVA environments. The present research will show how a data visualization system can be developed with VTK running on a personal computer. The topics will include: execution efficiency; visual object quality; availability of the user interface design; and exploring the feasibility of the VTK-based World Wide Web data visualization system. The present research will feature a case study showing how to use VTK to visualize meteorological data with techniques including, iso-surface, volume rendering, vector display, and composite analysis. The study also shows how the VTK outline, axes, and two-dimensional annotation text and title are enhancing the data presentation. The present research will also demonstrate how VTK works in an internet environment while accessing an executable with a JAVA application programing in a webpage.

  11. Influence of the glide path on various parameters of root canal prepared with WaveOne reciprocating file using cone beam computed tomography

    Directory of Open Access Journals (Sweden)

    Anil Dhingra

    2015-01-01

    Full Text Available Background: Nickel-titanium (NiTi rotary instrumentation carries a risk of fracture, mainly as a result of flexural (fatigue fracture and torsional (shear failure stresses. This risk might be reduced by creating a glide path before NiTi rotary instrumentation. The aim of this study was to compare various root canal parameters with the new WaveOne single-file reciprocating system in mesial canals of mandibular molars with and without glide path using cone beam computed tomography (CBCT. Materials and Methods: One hundred mandibular molar teeth with canal curvature between 20° and 30° were divided into two groups of 50 teeth each. In Group 1, no glide path was created, whereas in Group 2, a glide path was created with PathFiles at working length (WL. In both groups, canals were shaped with WaveOne primary reciprocating files to the WL. Canals were scanned in a CBCT unit before and after instrumentation. Postinstrumentation changes in canal curvature, cross-sectional area, centric ability, residual dentin thickness, and the extent of canal transportation were calculated using image analysis software and subjected to statistical analysis. Data were analyzed using Student′s t-test and Mann-Whitney U-test (P < 0.05. Results: The mean difference of root canal curvature, cross-sectional area, centric ability, and residual dentin thickness increased, whereas it reduced significantly for canal transportation in Group 2. Conclusion: WaveOne NiTi files appeared to maintain the original canal anatomy and the presence of a glide path further improves their performance and was found to be beneficial for all the parameters tested in this study.

  12. 18 CFR 35.24 - Tax normalization for public utilities.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Tax normalization for... Other Filing Requirements § 35.24 Tax normalization for public utilities. (a) Applicability. (1) Except... normalization required. (i) A public utility must compute the income tax component of its cost of service...

  13. ICRP Publication 116—the first ICRP/ICRU application of the male and female adult reference computational phantoms

    CERN Document Server

    Petoussi-Henss, Nina; Eckerman, Keith F; Endo, Akira; Hertel, Nolan; Hunt, John; Menzel, Hans G; Pelliccioni, Maurizio; Schlattl, Helmut; Zankl, Maria

    2014-01-01

    ICRP Publication 116 on `Conversion coefficients for radiological protection quantities for external radiation exposures', provides fluence-to-dose conversion coefficients for organ-absorbed doses and effective dose for various types of external exposures (ICRP 2010 ICRP Publication 116). The publication supersedes the ICRP Publication 74 (ICRP 1996 ICRP Publication 74, ICRU 1998 ICRU Report 57), including new particle types and expanding the energy ranges considered. The coefficients were calculated using the ICRP/ICRU computational phantoms (ICRP 2009 ICRP Publication 110) representing the reference adult male and reference adult female (ICRP 2002 ICRP Publication 89), together with a variety of Monte Carlo codes simulating the radiation transport in the body. Idealized whole-body irradiation from unidirectional and rotational parallel beams as well as isotropic irradiation was considered for a large variety of incident radiations and energy ranges. Comparison of the effective doses with operational quantit...

  14. Energy Efficiency in Public Buildings through Context-Aware Social Computing

    Science.gov (United States)

    García, Óscar; Alonso, Ricardo S.; Prieto, Javier; Corchado, Juan M.

    2017-01-01

    The challenge of promoting behavioral changes in users that leads to energy savings in public buildings has become a complex task requiring the involvement of multiple technologies. Wireless sensor networks have a great potential for the development of tools, such as serious games, that encourage acquiring good energy and healthy habits among users in the workplace. This paper presents the development of a serious game using CAFCLA, a framework that allows for integrating multiple technologies, which provide both context-awareness and social computing. Game development has shown that the data provided by sensor networks encourage users to reduce energy consumption in their workplace and that social interactions and competitiveness allow for accelerating the achievement of good results and behavioral changes that favor energy savings. PMID:28398237

  15. Associations between neck musculoskeletal complaints and work related factors among public service computer workers in Kaunas

    Directory of Open Access Journals (Sweden)

    Gintaré Kaliniene

    2013-10-01

    Full Text Available Objectives:Information technologies have been developing very rapidly, also in the case of occupational activities. Epidemiological studies have shown that employees, who work with computers, are more likely to complain of musculoskeletal disorders (MSD. The aim of this study was to evaluate associations between neck MSD and individual and work related factors. Materials and Methods: The investigation which consisted of two parts - a questionnaire study (using Nordic Musculoskeletal questionnaire and Copenhagen Psychosocial Questionnaire and a direct observation (to evaluate ergonomic work environment using RULA method was carried out in three randomly selected public sector companies of Kaunas. The study population consisted of 513 public service office workers. Results: The survey showed that neck MSDs were very common in the investigated population. The prevalence rate amounted to 65.7%. According to our survey neck MSDs were significantly associated with older age, bigger work experience, high quantitative and cognitive job demands, working for longer than 2 h without taking a break as well as with higher ergonomic risk score. The fully adjusted model working for longer than 2 h without taking a break had the strongest associations with neck complaints. Conclusion: It was confirmed, that neck MSDs were significantly associated with individual factors as well as conditions of work, therefore, preventive acions against neck complaints should be oriented at psychosocial and ergonomic work environment as well as at individual factors.

  16. Documentation for the NCES Common Core of Data National Public Education Financial Survey (NPEFS), School Year 2008-09 (Fiscal Year 2009). Revised File Version 1b. NCES 2011-330rev

    Science.gov (United States)

    Cornman, Stephen Q.; Zhou, Lei; Nakamoto, Nanae

    2012-01-01

    This documentation is for the revised file (Version 1b) of the National Center for Education Statistics' (NCES) Common Core of Data (CCD) National Public Education Financial Survey (NPEFS) for school year 2008-2009, fiscal year 2009 (FY 09). It contains a brief description of the data collection along with information required to understand and…

  17. Integrating Publicly Available Data to Generate Computationally Predicted Adverse Outcome Pathways for Fatty Liver.

    Science.gov (United States)

    Bell, Shannon M; Angrish, Michelle M; Wood, Charles E; Edwards, Stephen W

    2016-04-01

    Newin vitrotesting strategies make it possible to design testing batteries for large numbers of environmental chemicals. Full utilization of the results requires knowledge of the underlying biological networks and the adverse outcome pathways (AOPs) that describe the route from early molecular perturbations to an adverse outcome. Curation of a formal AOP is a time-intensive process and a rate-limiting step to designing these test batteries. Here, we describe a method for integrating publicly available data in order to generate computationally predicted AOP (cpAOP) scaffolds, which can be leveraged by domain experts to shorten the time for formal AOP development. A network-based workflow was used to facilitate the integration of multiple data types to generate cpAOPs. Edges between graph entities were identified through direct experimental or literature information, or computationally inferred using frequent itemset mining. Data from the TG-GATEs and ToxCast programs were used to channel large-scale toxicogenomics information into a cpAOP network (cpAOPnet) of over 20 000 relationships describing connections between chemical treatments, phenotypes, and perturbed pathways as measured by differential gene expression and high-throughput screening targets. The resulting fatty liver cpAOPnet is available as a resource to the community. Subnetworks of cpAOPs for a reference chemical (carbon tetrachloride, CCl4) and outcome (fatty liver) were compared with published mechanistic descriptions. In both cases, the computational approaches approximated the manually curated AOPs. The cpAOPnet can be used for accelerating expert-curated AOP development and to identify pathway targets that lack genomic markers or high-throughput screening tests. It can also facilitate identification of key events for designing test batteries and for classification and grouping of chemicals for follow up testing.

  18. panMetaDocs, eSciDoc, and DOIDB - an infrastructure for the curation and publication of file-based datasets for 'GFZ Data Services'

    Science.gov (United States)

    Ulbricht, Damian; Elger, Kirsten; Bertelmann, Roland; Klump, Jens

    2016-04-01

    With the foundation of DataCite in 2009 and the technical infrastructure installed in the last six years it has become very easy to create citable dataset DOIs. Nowadays, dataset DOIs are increasingly accepted and required by journals in reference lists of manuscripts. In addition, DataCite provides usage statistics [1] of assigned DOIs and offers a public search API to make research data count. By linking related information to the data, they become more useful for future generations of scientists. For this purpose, several identifier systems, as ISBN for books, ISSN for journals, DOI for articles or related data, Orcid for authors, and IGSN for physical samples can be attached to DOIs using the DataCite metadata schema [2]. While these are good preconditions to publish data, free and open solutions that help with the curation of data, the publication of research data, and the assignment of DOIs in one software seem to be rare. At GFZ Potsdam we built a modular software stack that is made of several free and open software solutions and we established 'GFZ Data Services'. 'GFZ Data Services' provides storage, a metadata editor for publication and a facility to moderate minted DOIs. All software solutions are connected through web APIs, which makes it possible to reuse and integrate established software. Core component of 'GFZ Data Services' is an eSciDoc [3] middleware that is used as central storage, and has been designed along the OAIS reference model for digital preservation. Thus, data are stored in self-contained packages that are made of binary file-based data and XML-based metadata. The eSciDoc infrastructure provides access control to data and it is able to handle half-open datasets, which is useful in embargo situations when a subset of the research data are released after an adequate period. The data exchange platform panMetaDocs [4] makes use of eSciDoc's REST API to upload file-based data into eSciDoc and uses a metadata editor [5] to annotate the files

  19. 75 FR 81595 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-12-28

    ...: ER11-111-001. Applicants: Public Service Company of New Mexico. Description: Public Service Company of New Mexico submits tariff filing per 35: PNM-WAPA Compliance Filing to be effective 10/15/2010. Filed...: Cambria Submits Corrected App. B. Filed Date: 12/16/2010. Accession Number: 20101216-5124. Comment Date: 5...

  20. OTS: a program for converting Noldus Observer data files to SDIS files.

    Science.gov (United States)

    Bakeman, R; Quera, V

    2000-02-01

    A program for converting Noldus Observer data files (ODF) to sequential data interchange standard (SDIS) files is described. Observer users who convert their data files can then take advantage of various flexible and powerful data modification and computational procedures available in the Generalized Sequential Querier, a program that assumes SDIS-formatted files.

  1. Public-Private Partnerships in Cloud-Computing Services in the Context of Genomic Research.

    Science.gov (United States)

    Granados Moreno, Palmira; Joly, Yann; Knoppers, Bartha Maria

    2017-01-01

    Public-private partnerships (PPPs) have been increasingly used to spur and facilitate innovation in a number of fields. In healthcare, the purpose of using a PPP is commonly to develop and/or provide vaccines and drugs against communicable diseases, mainly in developing or underdeveloped countries. With the advancement of technology and of the area of genomics, these partnerships also focus on large-scale genomic research projects that aim to advance the understanding of diseases that have a genetic component and to develop personalized treatments. This new focus has created new forms of PPPs that involve information technology companies, which provide computing infrastructure and services to store, analyze, and share the massive amounts of data genomic-related projects produce. In this article, we explore models of PPPs proposed to handle, protect, and share the genomic data collected and to further develop genomic-based medical products. We also identify the reasons that make these models suitable and the challenges they have yet to overcome. To achieve this, we describe the details and complexities of MSSNG, International Cancer Genome Consortium, and 100,000 Genomes Project, the three PPPs that focus on large-scale genomic research to better understand the genetic components of autism, cancer, rare diseases, and infectious diseases with the intention to find appropriate treatments. Organized as PPP and employing cloud-computing services, the three projects have advanced quickly and are likely to be important sources of research and development for future personalized medicine. However, there still are unresolved matters relating to conflicts of interest, commercialization, and data control. Learning from the challenges encountered by past PPPs allowed us to establish that developing guidelines to adequately manage personal health information stored in clouds and ensuring the protection of data integrity and privacy would be critical steps in the development of

  2. Selective File Dumper

    Science.gov (United States)

    Bassetti, Nanni; Frati, Denis

    During a computer forensics investigation we faced a problem how to get all the interesting files we need fast. We work, mainly, using the Open Source software products and Linux OS, and we consider the Sleuthkit and the Foremost two very useful tools, but for reaching our target they were too complicated and time consuming to use. For this reason we developed the Selective File Dumper, a Linux Bash script which makes it possible to extract all the referenced, deleted and unallocated files and finally to perform a keyword search, in a simple way.

  3. PUBLIC LINEAR PROGRAMMING SOLUTION FOR THE DESIGN OF SECURE AND EFFICIENT COMPUTING IN CLOUD

    Directory of Open Access Journals (Sweden)

    Dr.R.V.Krishnaiah

    2013-09-01

    Full Text Available This next generation of computing holds enormous potential to stimulate economic growth and enable governments to reduce costs, increase transparency and expand services to citizens. Cloud computing robust computational power to the society at reduced cost and enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner. Despite the tremendous benefits, security is the primary obstacle that prevents the wide adoption of this promising computing model, especially for customers when their confidential data are consumed and produced during the computation.

  4. 18 CFR 4.32 - Acceptance for filing or rejection; information to be made available to the public; requests for...

    Science.gov (United States)

    2010-04-01

    ... study, its methodology and objectives, whether the recommended study methods are generally accepted in... available. In addition, in the case of a study request by a resource agency or Indian tribe that had failed... or rejection; information to be made available to the public; requests for additional studies....

  5. Awareness of Accessibility Barriers in Computer-Based Instructional Materials and Faculty Demographics at South Dakota Public Universities

    Science.gov (United States)

    Olson, Christopher

    2013-01-01

    Advances in technology and course delivery methods have enabled persons with disabilities to enroll in higher education at an increasing rate. Federal regulations state persons with disabilities must be granted equal access to the information contained in computer-based instructional materials, but faculty at the six public universities in South…

  6. Computer-aided detection of pulmonary nodules: a comparative study using the public LIDC/IDRI database

    NARCIS (Netherlands)

    Jacobs, C.; Rikxoort, E.M. van; Murphy, K.; Prokop, M.; Schaefer-Prokop, C.M.; Ginneken, B. van

    2016-01-01

    To benchmark the performance of state-of-the-art computer-aided detection (CAD) of pulmonary nodules using the largest publicly available annotated CT database (LIDC/IDRI), and to show that CAD finds lesions not identified by the LIDC's four-fold double reading process.The LIDC/IDRI database

  7. Predicting the Number of Public Computer Terminals Needed for an On-Line Catalog: A Queuing Theory Approach.

    Science.gov (United States)

    Knox, A. Whitney; Miller, Bruce A.

    1980-01-01

    Describes a method for estimating the number of cathode ray tube terminals needed for public use of an online library catalog. Authors claim method could also be used to estimate needed numbers of microform readers for a computer output microform (COM) catalog. Formulae are included. (Author/JD)

  8. The national public's values and interests related to the Arctic National Wildlife Refuge: A computer content analysis

    Science.gov (United States)

    David N. Bengston; David P. Fan; Roger. Kaye

    2010-01-01

    This study examined the national public's values and interests related to the Arctic National Wildlife Refuge. Computer content analysis was used to analyze more than 23,000 media stories about the refuge from 1995 through 2007. Ten main categories of Arctic National Wildlife Refuge values and interests emerged from the analysis, reflecting a diversity of values,...

  9. Measuring Technological, Organizational and Environmental Factors Influencing the Adoption Intentions of Public Cloud Computing Using a Proposed Integrated Model

    Directory of Open Access Journals (Sweden)

    Minimol Anil Job

    2016-05-01

    Full Text Available The main objective of this research is to identify the factors influencing the intentions to adopt the public computing by the private sector firms. In this research the researcher examined the ten factors influencing the cloud computing adoption using a proposed integrated model which incorporates aspects of the Technology, Organization and Environment factors such as Complexity, Compatibility, Security Concerns, Trialability, Cost Saving, Top Management Support, Prior IT Experience, Organizational Readiness, Competitive Pressure and External Support. In order to test influencing factors a survey was conducted and one hundred and twenty two valid responses were received from IT decision makers from forty firms in different industries. The results revealed that the Compatibility, Cost Saving, Trialability and External Support are the main influential factors in the adoption intentions of public cloud computing. Future research could be built on this study by developing different model for each industry because each industry has unique characteristics that can influence the adoption of the technological innovations.

  10. Research on Technology of Recovery Algorithm based on File Feature in Computer Forensics%计算机取证中基于文件特征的数据恢复算法技术研究

    Institute of Scientific and Technical Information of China (English)

    李贵华; 荣世辉; 王刚

    2013-01-01

      为解决计算机取证中的数据恢复问题,提出了一种基于新式技术文件系统( new technology file system,NTFS)的数据恢复方案。通过剖析其主控文件表(master file table,MFT),提出一种基于文件特征的数据恢复算法。此算法通过全盘深粒度扫描磁盘扇区并根据各种类型文件的头部和尾部特征码在磁盘中匹配确定文件的起始和结束扇区,从而根据文件起始、结束扇区之间数据重建恢复此类型文件。实验结果表明,通过此算法设计的软件在搜索量,效率方面都有明显改善。%To solve data recovery problems in computer forensics, this paper proposed a new method for data recovery based on NTFS( new technology file system). By analyzing the structure of MFT(master file table),a recovery algorithm based on file feature,was presented in this paper.The algorithm identified the startand end sector of the lost file by scanning all sectors of the disk and matched them according to the head and foot feature codesof the lost files,then recovered the files by restoring the data between the start and the end sector.Experimental results show that the designed software in the search volume and efficiency has been improved significantly.

  11. 41 CFR 60-1.22 - Where to file.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Where to file. 60-1.22 Section 60-1.22 Public Contracts and Property Management Other Provisions Relating to Public Contracts... § 60-1.22 Where to file. Complaints may be filed with the OFCCP, 200 Constitution Avenue,...

  12. Public census data on CD-ROM at Lawrence Berkeley Laboratory. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Merrill, D.W.

    1992-07-02

    In connection with the Comprehensive Epidemiologic Data Resource (CEDR) and Populations at Risk to Environmental Pollution (PAREP) projects, of the Information and Computing Sciences Division (ICSD) at Lawrence Berkeley Laboratory (LBL), are using public socioeconomic and geographic data files which are available to CEDR and PAREP collaborators via LBL`s computing network. At this time 67 CD-ROM diskettes (approximately 35 gigabytes) are on line via the Unix file server cedrcd.lbl.gov. Most of the files are from the US Bureau of the Census, and most pertain to the 1990 Census of Population and Housing. This paper contains a list of the CD-ROMs available.

  13. Public census data on CD-ROM at Lawrence Berkeley Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Merrill, D.W.

    1992-07-02

    In connection with the Comprehensive Epidemiologic Data Resource (CEDR) and Populations at Risk to Environmental Pollution (PAREP) projects, of the Information and Computing Sciences Division (ICSD) at Lawrence Berkeley Laboratory (LBL), are using public socioeconomic and geographic data files which are available to CEDR and PAREP collaborators via LBL's computing network. At this time 67 CD-ROM diskettes (approximately 35 gigabytes) are on line via the Unix file server cedrcd.lbl.gov. Most of the files are from the US Bureau of the Census, and most pertain to the 1990 Census of Population and Housing. This paper contains a list of the CD-ROMs available.

  14. 47 CFR 73.1943 - Political file.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Political file. 73.1943 Section 73.1943... Rules Applicable to All Broadcast Stations § 73.1943 Political file. (a) Every licensee shall keep and permit public inspection of a complete and orderly record (political file) of all requests for...

  15. 47 CFR 76.1701 - Political file.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Political file. 76.1701 Section 76.1701... CABLE TELEVISION SERVICE Documents to be Maintained for Inspection § 76.1701 Political file. (a) Every... (political file) of all requests for cablecast time made by or on behalf of a candidate for public...

  16. 视频公开课字幕文件的制作技术探索%Exploration of the Manufacturing Technology of Caption Files in Video Public Class

    Institute of Scientific and Technical Information of China (English)

    张海兵; 刘阁

    2013-01-01

    This thesis introduces the technical standards of video producing in public class, the production of video public class and the SRT caption files. According to the standard of caption files, combining with the use of VisualSubSync, this thesis introduces the workflow of producing caption.%介绍了视频公开课拍摄制作技术标准、视频公开课的制作以及SRT格式字幕文件。并依据标准中有关字幕文件的要求,结合VisualSubSync软件的使用,详细介绍了字幕制作的工作流程。

  17. Pre-feasibility Study of Astronomical Data Archive Systems Powered by Public Cloud Computing and Hadoop Hive

    CERN Document Server

    Eguchi, Satoshi

    2016-01-01

    The size of astronomical observational data is increasing yearly. For example, while Atacama Large Millimeter/submillimeter Array is expected to generate 200 TB raw data every year, Large Synoptic Survey Telescope is estimated to produce 15 TB raw data every night. Since the increasing rate of computing is much lower than that of astronomical data, to provide high performance computing (HPC) resources together with scientific data will be common in the next decade. However, the installation and maintenance costs of a HPC system can be burdensome for the provider. I note public cloud computing for an alternative way to get sufficient computing resources inexpensively. I build Hadoop and Hive clusters by utilizing a virtual private server (VPS) service and Amazon Elastic MapReduce (EMR), and measure their performances. The VPS cluster behaves differently day by day, while the EMR clusters are relatively stable. Since partitioning is essential for Hive, several partitioning algorithms are evaluated. In this pape...

  18. Portable File Format (PFF) specifications

    Energy Technology Data Exchange (ETDEWEB)

    Dolan, Daniel H. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-02-01

    Created at Sandia National Laboratories, the Portable File Format (PFF) allows binary data transfer across computer platforms. Although this capability is supported by many other formats, PFF files are still in use at Sandia, particularly in pulsed power research. This report provides detailed PFF specifications for accessing data without relying on legacy code.

  19. File sharing

    NARCIS (Netherlands)

    van Eijk, N.

    2011-01-01

    File sharing’ has become generally accepted on the Internet. Users share files for downloading music, films, games, software etc. In this note, we have a closer look at the definition of file sharing, the legal and policy-based context as well as enforcement issues. The economic and cultural impact

  20. Micro-computed Tomography Assessment of Dentinal Micro-cracks after Root Canal Preparation with TRUShape and Self-adjusting File Systems.

    Science.gov (United States)

    Zuolo, Mario Luis; De-Deus, Gustavo; Belladonna, Felipe Gonçalves; Silva, Emmanuel João Nogueira Leal da; Lopes, Ricardo Tadeu; Souza, Erick Miranda; Versiani, Marco Aurélio; Zaia, Alexandre Augusto

    2017-04-01

    The aim of the present study was to evaluate the percentage frequency of dentinal micro-cracks observed after root canal preparation with TRUShape and Self-Adjusting File (SAF) systems by means of micro-computed tomography imaging analysis. A conventional full-sequence rotary system (BioRace) and a single-file reciprocation system (Reciproc) were used as reference techniques for comparison because of their known assertive cutting efficiency. Forty anatomically matched mandibular incisors were selected, scanned at a resolution of 14.25 μm, and assigned to 4 experimental groups (n = 10), according to the preparation protocol: TRUShape, SAF, BioRace, and Reciproc systems. After the experimental procedures, the specimens were scanned again, and the registered preoperative and postoperative cross-section images of the roots (n = 70,030) were screened to identify the presence of dentinal micro-cracks. Overall, dentinal defects were observed in 28,790 cross-section images (41.11%). In the TRUShape, SAF, BioRace, and Reciproc groups, dentinal micro-cracks were visualized in 56.47% (n = 9842), 42.38% (n = 7450), 32.90% (n = 5826), and 32.77% (n = 5672) of the slices, respectively. All dentinal defects observed in the postoperative data sets were already present in the corresponding preoperative images. None of the preparation systems induced the formation of new dentinal micro-cracks. Copyright © 2016 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  1. GIF versus JPEG: Choosing a Graphics Compression Format for Web Publications.

    Science.gov (United States)

    Nicholson, Scott

    1998-01-01

    Explains GIF and JPEG formats for computer graphics to help Web page creators make an informed decision when selecting a format for each graphic in a Web publication. Highlights include compressing and decompressing computer images; image quality, including color; special features, including animation; and file size. (Author/LRW)

  2. BPO crude oil analysis data base user`s guide: Methods, publications, computer access correlations, uses, availability

    Energy Technology Data Exchange (ETDEWEB)

    Sellers, C.; Fox, B.; Paulz, J.

    1996-03-01

    The Department of Energy (DOE) has one of the largest and most complete collections of information on crude oil composition that is available to the public. The computer program that manages this database of crude oil analyses has recently been rewritten to allow easier access to this information. This report describes how the new system can be accessed and how the information contained in the Crude Oil Analysis Data Bank can be obtained.

  3. 42 CFR 430.63 - Filing and service of papers.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Filing and service of papers. 430.63 Section 430.63... Conformity of State Medicaid Plans and Practice to Federal Requirements § 430.63 Filing and service of papers. (a) Filing. All papers in the proceedings are filed with the CMS Docket Clerk, in an original and...

  4. 45 CFR 1386.85 - Filing and service of papers.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Filing and service of papers. 1386.85 Section 1386... Requirements General § 1386.85 Filing and service of papers. (a) All papers in the proceedings must be filed... transcripts of testimony need be filed. (b) Copies of papers in the proceedings must be served on all...

  5. 77 FR 22326 - Privacy Act of 1974, as Amended by Public Law 100-503; Notice of a Computer Matching Program

    Science.gov (United States)

    2012-04-13

    ... HUMAN SERVICES Administration for Children and Families Privacy Act of 1974, as Amended by Public Law... 1974, as amended by Public Law 100-503. SUMMARY: In compliance with the Privacy Act of 1974, as amended by Public Law 100-503, the Computer Matching and Privacy Protection Act of 1988, ACF is publishing...

  6. Program Facilitates Distributed Computing

    Science.gov (United States)

    Hui, Joseph

    1993-01-01

    KNET computer program facilitates distribution of computing between UNIX-compatible local host computer and remote host computer, which may or may not be UNIX-compatible. Capable of automatic remote log-in. User communicates interactively with remote host computer. Data output from remote host computer directed to local screen, to local file, and/or to local process. Conversely, data input from keyboard, local file, or local process directed to remote host computer. Written in ANSI standard C language.

  7. Use of personal computers for translation and publication of an anesthesia textbook.

    Science.gov (United States)

    Kayama, H; Iwase, Y; Kinefuchi, Y; Suwa, K

    1995-03-01

    We used personal computers extensively for translating and publishing in Japanese an anesthesia textbook originally written in English. The procedure included optical character recognition, scanning of figures, use of computer translation, use of electronic mail and computer type-setting. While these have individually been done previously, this is process of any medical textbook published in Japanese. The advantages of combining these technologies are good exchange of information among individual authors/translators, rapid translation process, preliminary visualization of the final product, and overall high quality of the published book.

  8. Automatic Publication of a MIS Product to GeoNetwork: Case of the AIS Indexer

    Science.gov (United States)

    2012-11-01

    problem, then the MEF file is available for manual import to GeoNetwork. The output of this operation is the absolute path of the created MEF file. 2.3...computation. Since the AIS reception index application is implemented in Java, a Java interface was required to launch the GNP. The Publisher constructor ...product on GeoNetwork. This would reduce the overhead associated to the production of metadata at each manual publication. The following sections

  9. The GLEaMviz computational tool, a publicly available software to explore realistic epidemic spreading scenarios at the global scale

    Directory of Open Access Journals (Sweden)

    Quaggiotto Marco

    2011-02-01

    Full Text Available Abstract Background Computational models play an increasingly important role in the assessment and control of public health crises, as demonstrated during the 2009 H1N1 influenza pandemic. Much research has been done in recent years in the development of sophisticated data-driven models for realistic computer-based simulations of infectious disease spreading. However, only a few computational tools are presently available for assessing scenarios, predicting epidemic evolutions, and managing health emergencies that can benefit a broad audience of users including policy makers and health institutions. Results We present "GLEaMviz", a publicly available software system that simulates the spread of emerging human-to-human infectious diseases across the world. The GLEaMviz tool comprises three components: the client application, the proxy middleware, and the simulation engine. The latter two components constitute the GLEaMviz server. The simulation engine leverages on the Global Epidemic and Mobility (GLEaM framework, a stochastic computational scheme that integrates worldwide high-resolution demographic and mobility data to simulate disease spread on the global scale. The GLEaMviz design aims at maximizing flexibility in defining the disease compartmental model and configuring the simulation scenario; it allows the user to set a variety of parameters including: compartment-specific features, transition values, and environmental effects. The output is a dynamic map and a corresponding set of charts that quantitatively describe the geo-temporal evolution of the disease. The software is designed as a client-server system. The multi-platform client, which can be installed on the user's local machine, is used to set up simulations that will be executed on the server, thus avoiding specific requirements for large computational capabilities on the user side. Conclusions The user-friendly graphical interface of the GLEaMviz tool, along with its high level

  10. 43 CFR 4.1301 - Who may file.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Who may file. 4.1301 Section 4.1301 Public... Individual Civil Penalty Assessments Under Section 518(f) of the Act § 4.1301 Who may file. Any individual served a notice of proposed individual civil penalty assessment may file a petition for review with...

  11. 43 CFR 4.1161 - Who may file.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Who may file. 4.1161 Section 4.1161 Public... Violation and Orders of Cessation § 4.1161 Who may file. A permittee issued a notice or order by the....1160 may file an application for review with the Hearings Division, OHA, 801 North Quincy...

  12. 43 CFR 4.1361 - Who may file.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Who may file. 4.1361 Section 4.1361 Public... Lands) and for Coal Exploration Permits (federal Program) § 4.1361 Who may file. The applicant... forth in § 4.1360 may file a request for review of that decision....

  13. 43 CFR 4.1290 - Who may file.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Who may file. 4.1290 Section 4.1290 Public Lands: Interior Office of the Secretary of the Interior DEPARTMENT HEARINGS AND APPEALS PROCEDURES... Expenses Under Section 525(e) of the Act § 4.1290 Who may file. (a) Any person may file a petition...

  14. 43 CFR 4.1150 - Who may file.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Who may file. 4.1150 Section 4.1150 Public Lands: Interior Office of the Secretary of the Interior DEPARTMENT HEARINGS AND APPEALS PROCEDURES... Assessments of Civil Penalties § 4.1150 Who may file. Any person charged with a civil penalty may file...

  15. 43 CFR 4.1261 - When to file.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false When to file. 4.1261 Section 4.1261 Public Lands: Interior Office of the Secretary of the Interior DEPARTMENT HEARINGS AND APPEALS PROCEDURES....1261 When to file. An application for temporary relief may be filed by any party to a proceeding at...

  16. 43 CFR 4.1182 - Where to file.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Where to file. 4.1182 Section 4.1182 Public Lands: Interior Office of the Secretary of the Interior DEPARTMENT HEARINGS AND APPEALS PROCEDURES...) Or 521(a)(3) Orders of Cessation § 4.1182 Where to file. The application shall be filed in...

  17. 43 CFR 4.1262 - Where to file.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Where to file. 4.1262 Section 4.1262 Public Lands: Interior Office of the Secretary of the Interior DEPARTMENT HEARINGS AND APPEALS PROCEDURES....1262 Where to file. The application shall be filed with the administrative law judge to whom the...

  18. 41 CFR 105-54.203-2 - Active charters file.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Active charters file. 105-54.203-2 Section 105-54.203-2 Public Contracts and Property Management Federal Property Management... charters file. The GSA Committee Management Officer retains each original signed charter in a file...

  19. Automatic detection of lung nodules in computed tomography images: training and validation of algorithms using public research databases

    Science.gov (United States)

    Camarlinghi, Niccolò

    2013-09-01

    Lung cancer is one of the main public health issues in developed countries. Lung cancer typically manifests itself as non-calcified pulmonary nodules that can be detected reading lung Computed Tomography (CT) images. To assist radiologists in reading images, researchers started, a decade ago, the development of Computer Aided Detection (CAD) methods capable of detecting lung nodules. In this work, a CAD composed of two CAD subprocedures is presented: , devoted to the identification of parenchymal nodules, and , devoted to the identification of the nodules attached to the pleura surface. Both CADs are an upgrade of two methods previously presented as Voxel Based Neural Approach CAD . The novelty of this paper consists in the massive training using the public research Lung International Database Consortium (LIDC) database and on the implementation of new features for classification with respect to the original VBNA method. Finally, the proposed CAD is blindly validated on the ANODE09 dataset. The result of the validation is a score of 0.393, which corresponds to the average sensitivity of the CAD computed at seven predefined false positive rates: 1/8, 1/4, 1/2, 1, 2, 4, and 8 FP/CT.

  20. 基于系统日志文件的计算机系统脆弱性分析%Analysis of the Computer System Vulnerability based on the System Log File

    Institute of Scientific and Technical Information of China (English)

    黄波

    2012-01-01

      随着信息社会的发展,计算机系统的安全是信息社会中信息安全保障的重要部分之一。文章根据Windows系统、数据库系统、防火墙系统的日志文件形式、结构、内容的组成,分析了在计算机操作系统、网络系统中日志文件的安全性及其安全作用,并阐述了实现计算机系统脆弱性分析的根源。%  With the development of information society, the security of the computer system in the information society is the most important part of information security. In this paper, According to form and structure and content of log file in the windows system, database system, firewall system ,analysed the safety and security of log files in the computer operating system and network system, and elaborated the root of realizing computer system vulnerability analysis of through the system log files.

  1. Enabling Water Quality Management Decision Support and Public Outreach Using Cloud-Computing Services

    Science.gov (United States)

    Sun, A. Y.; Scanlon, B. R.; Uhlman, K.

    2013-12-01

    Watershed management is a participatory process that requires collaboration among multiple groups of people. Environmental decision support systems (EDSS) have long been used to support such co-management and co-learning processes in watershed management. However, implementing and maintaining EDSS in-house can be a significant burden to many water agencies because of budget, technical, and policy constraints. Basing on experiences from several web-GIS environmental management projects in Texas, we showcase how cloud-computing services can help shift the design and hosting of EDSS from the traditional client-server-based platforms to be simple clients of cloud-computing services.

  2. Effectiveness of the Computer and Internet Literacy Project in Public High Schools of Tarlac Province, Philippines

    Science.gov (United States)

    Lorenzo, Arnold R.

    2016-01-01

    Evaluation is important to gauge the strengths, weaknesses and effectiveness of any activity. This study evaluated the iSchools Project implemented in the Public High Schools of Tarlac Province, Philippines by the Commission on Information and Communications Technology (CICT) in partnership with the selected State Universities and Colleges. Using…

  3. An Overview of Public Access Computer Software Management Tools for Libraries

    Science.gov (United States)

    Wayne, Richard

    2004-01-01

    An IT decision maker gives an overview of public access PC software that's useful in controlling session length and scheduling, Internet access, print output, security, and the latest headaches: spyware and adware. In this article, the author describes a representative sample of software tools in several important categories such as setup…

  4. Factors Influencing the Adoption of and Business Case for Cloud Computing in the Public Sector

    NARCIS (Netherlands)

    Kuiper, E.; Van Dam, F.; Reiter, A.; Janssen, M.F.W.H.A.

    2014-01-01

    Cloud adoption in the public sector is taking off slowly, which is perceived as a problem. Models of factors influencing cloud adoption are derived for better understanding using literature and results obtained via desk research and surveys by the Cloud for Europe project. We conclude that several f

  5. Factors Influencing the Adoption of and Business Case for Cloud Computing in the Public Sector

    NARCIS (Netherlands)

    Kuiper, E.; Van Dam, F.; Reiter, A.; Janssen, M.F.W.H.A.

    2014-01-01

    Cloud adoption in the public sector is taking off slowly, which is perceived as a problem. Models of factors influencing cloud adoption are derived for better understanding using literature and results obtained via desk research and surveys by the Cloud for Europe project. We conclude that several

  6. Computer-Based Video Instruction to Teach Students with Intellectual Disabilities to Use Public Bus Transportation

    Science.gov (United States)

    Mechling, Linda; O'Brien, Eileen

    2010-01-01

    This study investigated the effectiveness of computer-based video instruction (CBVI) to teach three young adults with moderate intellectual disabilities to push a "request to stop bus signal" and exit a city bus in response to target landmarks. A multiple probe design across three students and one bus route was used to evaluate effectiveness of…

  7. Computers in the Curriculum of Secondary Schools. Practitioner MiniPaper 8. SCR Publication 106.

    Science.gov (United States)

    Morrison, Arnold

    The two studies reported in this document were commissioned by the Scottish Education Department. The first is a review of research on the effectiveness of computers as resources for learning and teaching. It reports the general findings from a large number of studies concerned with the achievement and attitudes of students and then considers some…

  8. A Multi-Language Computing Environment for Literate Programming and Reproducible Research

    Directory of Open Access Journals (Sweden)

    Eric Schulte

    2012-01-01

    Full Text Available We present a new computing environment for authoring mixed natural and computer language documents. In this environment a single hierarchically-organized plain text source file may contain a variety of elements such as code in arbitrary programming languages, raw data, links to external resources, project management data, working notes, and text for publication. Code fragments may be executed in situ with graphical, numerical and textual output captured or linked in the le. Export to LATEX, HTML, LATEX beamer, DocBook and other formats permits working reports, presentations and manuscripts for publication to be generated from the file. In addition, functioning pure code files can be automatically extracted from the file. This environment is implemented as an extension to the Emacs text editor and provides a rich set of features for authoring both prose and code, as well as sophisticated project management capabilities.

  9. The Jupyter/IPython architecture: a unified view of computational research, from interactive exploration to communication and publication.

    Science.gov (United States)

    Ragan-Kelley, M.; Perez, F.; Granger, B.; Kluyver, T.; Ivanov, P.; Frederic, J.; Bussonnier, M.

    2014-12-01

    IPython has provided terminal-based tools for interactive computing in Python since 2001. The notebook document format and multi-process architecture introduced in 2011 have expanded the applicable scope of IPython into teaching, presenting, and sharing computational work, in addition to interactive exploration. The new architecture also allows users to work in any language, with implementations in Python, R, Julia, Haskell, and several other languages. The language agnostic parts of IPython have been renamed to Jupyter, to better capture the notion that a cross-language design can encapsulate commonalities present in computational research regardless of the programming language being used. This architecture offers components like the web-based Notebook interface, that supports rich documents that combine code and computational results with text narratives, mathematics, images, video and any media that a modern browser can display. This interface can be used not only in research, but also for publication and education, as notebooks can be converted to a variety of output formats, including HTML and PDF. Recent developments in the Jupyter project include a multi-user environment for hosting notebooks for a class or research group, a live collaboration notebook via Google Docs, and better support for languages other than Python.

  10. Reflections on Teachers Cooperative Teaching about Computer Public Course%对计算机公共课教师合作教学的思考

    Institute of Scientific and Technical Information of China (English)

    李富芸; 吴淑雷

    2014-01-01

    在计算机公共课2位教师合作教学的教学实践基础上,反思了计算机公共课教师合作教学的利与弊。%Practice in two teachers co-teaching about computer public course,reflects the pros and cons of teachers cooperative teaching about computer public course.

  11. LocalMove: computing on-lattice fits for biopolymers

    Science.gov (United States)

    Ponty, Y.; Istrate, R.; Porcelli, E.; Clote, P.

    2008-01-01

    Given an input Protein Data Bank file (PDB) for a protein or RNA molecule, LocalMove is a web server that determines an on-lattice representation for the input biomolecule. The web server implements a Markov Chain Monte-Carlo algorithm with simulated annealing to compute an approximate fit for either the coarse-grain model or backbone model on either the cubic or face-centered cubic lattice. LocalMove returns a PDB file as output, as well as dynamic movie of 3D images of intermediate conformations during the computation. The LocalMove server is publicly available at http://bioinformatics.bc.edu/clotelab/localmove/. PMID:18556754

  12. Reference computations of public dose and cancer risk from airborne releases of plutonium. Nuclear safety technical report

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, V.L.

    1993-12-23

    This report presents results of computations of doses and the associated health risks of postulated accidental atmospheric releases from the Rocky Flats Plant (RFP) of one gram of weapons-grade plutonium in a form that is respirable. These computations are intended to be reference computations that can be used to evaluate a variety of accident scenarios by scaling the dose and health risk results presented here according to the amount of plutonium postulated to be released, instead of repeating the computations for each scenario. The MACCS2 code has been used as the basis of these computations. The basis and capabilities of MACCS2 are summarized, the parameters used in the evaluations are discussed, and results are presented for the doses and health risks to the public, both the Maximum Offsite Individual (a maximally exposed individual at or beyond the plant boundaries) and the population within 50 miles of RFP. A number of different weather scenarios are evaluated, including constant weather conditions and observed weather for 1990, 1991, and 1992. The isotopic mix of weapons-grade plutonium will change as it ages, the {sup 241}Pu decaying into {sup 241}Am. The {sup 241}Am reaches a peak concentration after about 72 years. The doses to the bone surface, liver, and whole body will increase slightly but the dose to the lungs will decrease slightly. The overall cancer risk will show almost no change over this period. This change in cancer risk is much smaller than the year-to-year variations in cancer risk due to weather. Finally, x/Q values are also presented for other applications, such as for hazardous chemical releases. These include the x/Q values for the MOI, for a collocated worker at 100 meters downwind of an accident site, and the x/Q value integrated over the population out to 50 miles.

  13. Computer program to plot isotherms in bodies of water. Environmental Sciences Division publication No. 1199

    Energy Technology Data Exchange (ETDEWEB)

    DeAngelis, D.L.

    1978-06-01

    For purposes of graphic display it is convenient to represent temperature versus depth data in bodies of water in the form of isotherms (lines of equal temperature). Because it can be tedious to draw such lines by hand from raw data, a computer code has been devised to plot these lines automatically. The procedure assumes that the temperature can be linearly interpolated between the points at which measurements are taken. Details of the code are explained by means of examples. With minor changes, the program can be used to plot isoclines of other environmental parameters.

  14. Computer program to plot isotherms in bodies of water. Environmental Sciences Division publication No. 1199

    Energy Technology Data Exchange (ETDEWEB)

    DeAngelis, D.L.

    1978-06-01

    For purposes of graphic display it is convenient to represent temperature versus depth data in bodies of water in the form of isotherms (lines of equal temperature). Because it can be tedious to draw such lines by hand from raw data, a computer code has been devised to plot these lines automatically. The procedure assumes that the temperature can be linearly interpolated between the points at which measurements are taken. Details of the code are explained by means of examples. With minor changes, the program can be used to plot isoclines of other environmental parameters.

  15. Selected Publications in Image Understanding and Computer Vision from 1974 to 1983

    Science.gov (United States)

    1985-04-18

    graylevel image processing, in (261], 135-147. * 327. C. Guerra , Reflections on local computations, in [261], 221-229. D.3. Software, etc. 368. D...system" for reconstruction of mechanical object from projections, in [4], 491-496. 843,, B. Cernuschi- Frias , D. B. Cooper, and R. M. Bolle, Estimation of...K. R. Sloan, Jr., Analysis of "dot product" shape descriptions, T-PAMI 4, 1982, 87-90. 1012. C. Guerra and G. G. Pieroni, A graph-theoretic method

  16. Virtual Space Exploration: Let's Use Web-Based Computer Game Technology to Boost IYA 2009 Public Interest

    Science.gov (United States)

    Hussey, K.; Doronila, P.; Kulikov, A.; Lane, K.; Upchurch, P.; Howard, J.; Harvey, S.; Woodmansee, L.

    2008-09-01

    With the recent releases of both Google's "Sky" and Microsoft's "WorldWide Telescope" and the large and increasing popularity of video games, the time is now for using these tools, and those crafted at NASA's Jet Propulsion Laboratory, to engage the public in astronomy like never before. This presentation will use "Cassini at Saturn Interactive Explorer " (CASSIE) to demonstrate the power of web-based video-game engine technology in providing the public a "first-person" look at space exploration. The concept of virtual space exploration is to allow the public to "see" objects in space as if they were either riding aboard or "flying" next to an ESA/NASA spacecraft. Using this technology, people are able to immediately "look" in any direction from their virtual location in space and "zoom-in" at will. Users can position themselves near Saturn's moons and observe the Cassini Spacecraft's "encounters" as they happened. Whenever real data for their "view" exists it is incorporated into the scene. Where data is missing, a high-fidelity simulation of the view is generated to fill in the scene. The observer can also change the time of observation into the past or future. Our approach is to utilize and extend the Unity 3d game development tool, currently in use by the computer gaming industry, along with JPL mission specific telemetry and instrument data to build our virtual explorer. The potential of the application of game technology for the development of educational curricula and public engagement are huge. We believe this technology can revolutionize the way the general public and the planetary science community views ESA/NASA missions and provides an educational context that is attractive to the younger generation. This technology is currently under development and application at JPL to assist our missions in viewing their data, communicating with the public and visualizing future mission plans. Real-time demonstrations of CASSIE and other applications in development

  17. A Method to Defend File-Attacking

    Institute of Scientific and Technical Information of China (English)

    HE Hongjun; LUO Li; CAO Sihua; FENG Tao; PAN Li; ZOU Zhiji

    2006-01-01

    The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information, and proposes an explicit authorization mechanism. Its basic idea is that user explicitly authorizes program the file set it can access, and monitor all file access operations; once program requests to access file out of the authorized file set, refuse it, and this means that the program is malicious or has design errors. Computers based on this novel mechanism can protect information from attacking reliably, and have good software and hardware compatibility. A testing system is presented to validate our theory.

  18. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview In autumn the main focus was to process and handle CRAFT data and to perform the Summer08 MC production. The operational aspects were well covered by regular Computing Shifts, experts on duty and Computing Run Coordination. At the Computing Resource Board (CRB) in October a model to account for service work at Tier 2s was approved. The computing resources for 2009 were reviewed for presentation at the C-RRB. The quarterly resource monitoring is continuing. Facilities/Infrastructure operations Operations during CRAFT data taking ran fine. This proved to be a very valuable experience for T0 workflows and operations. The transfers of custodial data to most T1s went smoothly. A first round of reprocessing started at the Tier-1 centers end of November; it will take about two weeks. The Computing Shifts procedure was tested full scale during this period and proved to be very efficient: 30 Computing Shifts Persons (CSP) and 10 Computing Resources Coordinators (CRC). The shift program for the shut down w...

  19. ACUTRI a computer code for assessing doses to the general public due to acute tritium releases

    CERN Document Server

    Yokoyama, S; Noguchi, H; Ryufuku, S; Sasaki, T

    2002-01-01

    Tritium, which is used as a fuel of a D-T burning fusion reactor, is the most important radionuclide for the safety assessment of a nuclear fusion experimental reactor such as ITER. Thus, a computer code, ACUTRI, which calculates the radiological impact of tritium released accidentally to the atmosphere, has been developed, aiming to be of use in a discussion of licensing of a fusion experimental reactor and an environmental safety evaluation method in Japan. ACUTRI calculates an individual tritium dose based on transfer models specific to tritium in the environment and ICRP dose models. In this calculation it is also possible to analyze statistically on meteorology in the same way as a conventional dose assessment method according to the meteorological guide of the Nuclear Safety Commission of Japan. A Gaussian plume model is used for calculating the atmospheric dispersion of tritium gas (HT) and/or tritiated water (HTO). The environmental pathway model in ACUTRI considers the following internal exposures: i...

  20. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview During the past three months activities were focused on data operations, testing and re-enforcing shift and operational procedures for data production and transfer, MC production and on user support. Planning of the computing resources in view of the new LHC calendar in ongoing. Two new task forces were created for supporting the integration work: Site Commissioning, which develops tools helping distributed sites to monitor job and data workflows, and Analysis Support, collecting the user experience and feedback during analysis activities and developing tools to increase efficiency. The development plan for DMWM for 2009/2011 was developed at the beginning of the year, based on the requirements from the Physics, Computing and Offline groups (see Offline section). The Computing management meeting at FermiLab on February 19th and 20th was an excellent opportunity discussing the impact and for addressing issues and solutions to the main challenges facing CMS computing. The lack of manpower is particul...

  1. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction CMS distributed computing system performed well during the 2011 start-up. The events in 2011 have more pile-up and are more complex than last year; this results in longer reconstruction times and harder events to simulate. Significant increases in computing capacity were delivered in April for all computing tiers, and the utilisation and load is close to the planning predictions. All computing centre tiers performed their expected functionalities. Heavy-Ion Programme The CMS Heavy-Ion Programme had a very strong showing at the Quark Matter conference. A large number of analyses were shown. The dedicated heavy-ion reconstruction facility at the Vanderbilt Tier-2 is still involved in some commissioning activities, but is available for processing and analysis. Facilities and Infrastructure Operations Facility and Infrastructure operations have been active with operations and several important deployment tasks. Facilities participated in the testing and deployment of WMAgent and WorkQueue+Request...

  2. COMPUTING

    CERN Multimedia

    P. McBride

    The Computing Project is preparing for a busy year where the primary emphasis of the project moves towards steady operations. Following the very successful completion of Computing Software and Analysis challenge, CSA06, last fall, we have reorganized and established four groups in computing area: Commissioning, User Support, Facility/Infrastructure Operations and Data Operations. These groups work closely together with groups from the Offline Project in planning for data processing and operations. Monte Carlo production has continued since CSA06, with about 30M events produced each month to be used for HLT studies and physics validation. Monte Carlo production will continue throughout the year in the preparation of large samples for physics and detector studies ramping to 50 M events/month for CSA07. Commissioning of the full CMS computing system is a major goal for 2007. Site monitoring is an important commissioning component and work is ongoing to devise CMS specific tests to be included in Service Availa...

  3. ACONC Files

    Data.gov (United States)

    U.S. Environmental Protection Agency — ACONC files containing simulated ozone and PM2.5 fields that were used to create the model difference plots shown in the journal article. This dataset is associated...

  4. 831 Files

    Data.gov (United States)

    Social Security Administration — SSA-831 file is a collection of initial and reconsideration adjudicative level DDS disability determinations. (A few hearing level cases are also present, but the...

  5. File Type Identification of File Fragments using Longest Common Subsequence (LCS)

    Science.gov (United States)

    Rahmat, R. F.; Nicholas, F.; Purnamawati, S.; Sitompul, O. S.

    2017-01-01

    Computer forensic analyst is a person in charge of investigation and evidence tracking. In certain cases, the file needed to be presented as digital evidence was deleted. It is difficult to reconstruct the file, because it often lost its header and cannot be identified while being restored. Therefore, a method is required for identifying the file type of file fragments. In this research, we propose Longest Common Subsequences that consists of three steps, namely training, testing and validation, to identify the file type from file fragments. From all testing results we can conlude that our proposed method works well and achieves 92.91% of accuracy to identify the file type of file fragment for three data types.

  6. BindingDB in 2015: A public database for medicinal chemistry, computational chemistry and systems pharmacology.

    Science.gov (United States)

    Gilson, Michael K; Liu, Tiqing; Baitaluk, Michael; Nicola, George; Hwang, Linda; Chong, Jenny

    2016-01-04

    BindingDB, www.bindingdb.org, is a publicly accessible database of experimental protein-small molecule interaction data. Its collection of over a million data entries derives primarily from scientific articles and, increasingly, US patents. BindingDB provides many ways to browse and search for data of interest, including an advanced search tool, which can cross searches of multiple query types, including text, chemical structure, protein sequence and numerical affinities. The PDB and PubMed provide links to data in BindingDB, and vice versa; and BindingDB provides links to pathway information, the ZINC catalog of available compounds, and other resources. The BindingDB website offers specialized tools that take advantage of its large data collection, including ones to generate hypotheses for the protein targets bound by a bioactive compound, and for the compounds bound by a new protein of known sequence; and virtual compound screening by maximal chemical similarity, binary kernel discrimination, and support vector machine methods. Specialized data sets are also available, such as binding data for hundreds of congeneric series of ligands, drawn from BindingDB and organized for use in validating drug design methods. BindingDB offers several forms of programmatic access, and comes with extensive background material and documentation. Here, we provide the first update of BindingDB since 2007, focusing on new and unique features and highlighting directions of importance to the field as a whole.

  7. Exploration of Preterm Birth Rates Using the Public Health Exposome Database and Computational Analysis Methods

    Directory of Open Access Journals (Sweden)

    Anne D. Kershenbaum

    2014-11-01

    Full Text Available Recent advances in informatics technology has made it possible to integrate, manipulate, and analyze variables from a wide range of scientific disciplines allowing for the examination of complex social problems such as health disparities. This study used 589 county-level variables to identify and compare geographical variation of high and low preterm birth rates. Data were collected from a number of publically available sources, bringing together natality outcomes with attributes of the natural, built, social, and policy environments. Singleton early premature county birth rate, in counties with population size over 100,000 persons provided the dependent variable. Graph theoretical techniques were used to identify a wide range of predictor variables from various domains, including black proportion, obesity and diabetes, sexually transmitted infection rates, mother’s age, income, marriage rates, pollution and temperature among others. Dense subgraphs (paracliques representing groups of highly correlated variables were resolved into latent factors, which were then used to build a regression model explaining prematurity (R-squared = 76.7%. Two lists of counties with large positive and large negative residuals, indicating unusual prematurity rates given their circumstances, may serve as a starting point for ways to intervene and reduce health disparities for preterm births.

  8. ACUTRI: a computer code for assessing doses to the general public due to acute tritium releases

    Energy Technology Data Exchange (ETDEWEB)

    Yokoyama, Sumi; Noguchi, Hiroshi [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment; Ryufuku, Susumu; Sasaki, Toshihisa; Kurosawa, Naohiro [Visible Information Center, Inc., Tokai, Ibaraki (Japan)

    2002-11-01

    Tritium, which is used as a fuel of a D-T burning fusion reactor, is the most important radionuclide for the safety assessment of a nuclear fusion experimental reactor such as ITER. Thus, a computer code, ACUTRI, which calculates the radiological impact of tritium released accidentally to the atmosphere, has been developed, aiming to be of use in a discussion of licensing of a fusion experimental reactor and an environmental safety evaluation method in Japan. ACUTRI calculates an individual tritium dose based on transfer models specific to tritium in the environment and ICRP dose models. In this calculation it is also possible to analyze statistically on meteorology in the same way as a conventional dose assessment method according to the meteorological guide of the Nuclear Safety Commission of Japan. A Gaussian plume model is used for calculating the atmospheric dispersion of tritium gas (HT) and/or tritiated water (HTO). The environmental pathway model in ACUTRI considers the following internal exposures: inhalation from a primary plume (HT and/or HTO) released from the facilities and inhalation from a secondary plume (HTO) reemitted from the ground following deposition of HT and HTO. This report describes an outline of the ACUTRI code, a user guide and the results of test calculation. (author)

  9. Efficacy of Twisted File Adaptive, Reciproc and ProTaper Universal Retreatment instruments for root-canal-filling removal: A cone-beam computed tomography study.

    Science.gov (United States)

    Akbulut, Makbule Bilge; Akman, Melek; Terlemez, Arslan; Magat, Guldane; Sener, Sevgi; Shetty, Heeresh

    2016-01-01

    The aim of this study was to evaluate the efficacy of Twisted File (TF) Adaptive, Reciproc, and ProTaper Universal Retreatment (UR) System instruments for removing root-canal-filling. Sixty single rooted teeth were decoronated, instrumented and obturated. Preoperative CBCT scans were taken and the teeth were retreated with TF Adaptive, Reciproc, ProTaper UR, or hand files (n=15). Then, the teeth were rescanned, and the percentage volume of the residual root-canal-filling material was established. The total time for retreatment was recorded, and the data was statistically analyzed. The statistical ranking of the residual filling material volume was as follows: hand file=TF Adaptive>ProTaper UR=Reciproc. The ProTaper UR and Reciproc systems required shorter periods of time for retreatment. Root canal filling was more efficiently removed by using Reciproc and ProTaper UR instruments than TF Adaptive instruments and hand files. The TF Adaptive system was advantageous over hand files with regard to operating time.

  10. Simplified generation of biomedical 3D surface model data for embedding into 3D portable document format (PDF) files for publication and education.

    Science.gov (United States)

    Newe, Axel; Ganslandt, Thomas

    2013-01-01

    The usefulness of the 3D Portable Document Format (PDF) for clinical, educational, and research purposes has recently been shown. However, the lack of a simple tool for converting biomedical data into the model data in the necessary Universal 3D (U3D) file format is a drawback for the broad acceptance of this new technology. A new module for the image processing and rapid prototyping framework MeVisLab does not only provide a platform-independent possibility to create surface meshes out of biomedical/DICOM and other data and to export them into U3D--it also lets the user add meta data to these meshes to predefine colors and names that can be processed by a PDF authoring software while generating 3D PDF files. Furthermore, the source code of the respective module is available and well documented so that it can easily be modified for own purposes.

  11. COMPUTING

    CERN Multimedia

    I. Fisk

    2013-01-01

    Computing activity had ramped down after the completion of the reprocessing of the 2012 data and parked data, but is increasing with new simulation samples for analysis and upgrade studies. Much of the Computing effort is currently involved in activities to improve the computing system in preparation for 2015. Operations Office Since the beginning of 2013, the Computing Operations team successfully re-processed the 2012 data in record time, not only by using opportunistic resources like the San Diego Supercomputer Center which was accessible, to re-process the primary datasets HTMHT and MultiJet in Run2012D much earlier than planned. The Heavy-Ion data-taking period was successfully concluded in February collecting almost 500 T. Figure 3: Number of events per month (data) In LS1, our emphasis is to increase efficiency and flexibility of the infrastructure and operation. Computing Operations is working on separating disk and tape at the Tier-1 sites and the full implementation of the xrootd federation ...

  12. The Perceptions of Globalization at a Public Research University Computer Science Graduate Department

    Science.gov (United States)

    Nielsen, Selin Yildiz

    Based on a qualitative methodological approach, this study focuses on the understanding of a phenomenon called globalization in a research university computer science department. The study looks into the participants' perspectives about the department, its dynamics, culture and academic environment as related to globalization. The economic, political, academic and social/cultural aspects of the department are taken into consideration in investigating the influences of globalization. Three questions guide this inquiry: 1) How is the notion of globalization interpreted in this department? 2) How does the perception of globalization influence the department in terms of finances, academics, policies and social life And 3) How are these perceptions influence the selection of students? Globalization and neo-institutional view of legitimacy is used as theoretical lenses to conceptualize responses to these questions. The data include interviews, field notes, official and non-official documents. Interpretations of these data are compared to findings from prior research on the impact of globalization in order to clarify and validate findings. Findings show that there is disagreement in how the notion of globalization is interpreted between the doctoral students and the faculty in the department. This disagreement revealed the attitudes and interpretations of globalization in the light of the policies and procedures related to the department. How the faculty experience globalization is not consistent with the literature in this project. The literature states that globalization is a big part of higher education and it is a phenomenon that causes the changes in the goals and missions of higher education institutions (Knight, 2003, De Witt, 2005). The data revealed that globalization is not the cause for change but more of a consequence of actions that take place in achieving the goals and missions of the department.

  13. Identifiable Data Files - Denominator File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Denominator File combines Medicare beneficiary entitlement status information from administrative enrollment records with third-party payer information and GHP...

  14. Computer

    CERN Document Server

    Atkinson, Paul

    2011-01-01

    The pixelated rectangle we spend most of our day staring at in silence is not the television as many long feared, but the computer-the ubiquitous portal of work and personal lives. At this point, the computer is almost so common we don't notice it in our view. It's difficult to envision that not that long ago it was a gigantic, room-sized structure only to be accessed by a few inspiring as much awe and respect as fear and mystery. Now that the machine has decreased in size and increased in popular use, the computer has become a prosaic appliance, little-more noted than a toaster. These dramati

  15. Reference computations of public dose and cancer risk from airborne releases of uranium and Class W plutonium

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, V.L.

    1995-06-06

    This report presents ``reference`` computations that can be used by safety analysts in the evaluations of the consequences of postulated atmospheric releases of radionuclides from the Rocky Flats Environmental Technology Site. These computations deal specifically with doses and health risks to the public. The radionuclides considered are Class W Plutonium, all classes of Enriched Uranium, and all classes of Depleted Uranium. (The other class of plutonium, Y, was treated in an earlier report.) In each case, one gram of the respirable material is assumed to be released at ground leveL both with and without fire. The resulting doses and health risks can be scaled to whatever amount of release is appropriate for a postulated accident being investigated. The report begins with a summary of the organ-specific stochastic risk factors appropriate for alpha radiation, which poses the main health risk of plutonium and uranium. This is followed by a summary of the atmospheric dispersion factors for unfavorable and typical weather conditions for the calculation of consequences to both the Maximum Offsite Individual and the general population within 80 km (50 miles) of the site.

  16. The Automation of Government Publications: Functional Requirements and Selected Software Systems for Serials Controls.

    Science.gov (United States)

    Stephenson, Mary Sue; Purcell, Gary R.

    1985-01-01

    Describes computer-based software and network systems for application to serials and government publications. General and specific functional requirements (hardware, software, file structure) are discussed, and descriptive information about commercially available serials control systems and a list of distributors are provided. (CLB)

  17. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion An activity that is still in progress is computing for the heavy-ion program. The heavy-ion events are collected without zero suppression, so the event size is much large at roughly 11 MB per event of RAW. The central collisions are more complex and...

  18. COMPUTING

    CERN Multimedia

    M. Kasemann P. McBride Edited by M-C. Sawley with contributions from: P. Kreuzer D. Bonacorsi S. Belforte F. Wuerthwein L. Bauerdick K. Lassila-Perini M-C. Sawley

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the comput...

  19. New details emerge from the Einstein files

    CERN Multimedia

    Overbye, D

    2002-01-01

    For many years the FBI spied on Einstein. New details of this surveilance are emerging in "The Einstein File: J. Edgar Hoover's Secret War Against the World's Most Famous Scientist," by Fred Jerome, who sued the government with the help of the Public Citizen Litigation Group to obtain a less censored version of the file (1 page).

  20. Public census data on CD-ROM at Lawrence Berkeley Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Merrill, D.W.

    1992-10-01

    The Comprehensive Epidemiologic Data Resource (CEDR) and Populations at Risk to Environmental Pollution (PAREP) projects, of the Information and Computing Sciences Division (ICSD) at Lawrence Berkeley Laboratory (LBL), are using public socio-economic and geographic data files which are available to CEDR and PAREP collaborators via LBL`s computing network. At this time 70 CD-ROM diskettes (approximately 36 gigabytes) are on line via the Unix file server cedrcd. lbl. gov. Most of the files are from the US Bureau of the Census, and most pertain to the 1990 Census of Population and Housing. All the CD-ROM diskettes contain documentation in the form of ASCII text files. Printed documentation for most files is available for inspection at University of California Data and Technical Assistance (UC DATA), or the UC Documents Library. Many of the CD-ROM diskettes distributed by the Census Bureau contain software for PC compatible computers, for easily accessing the data. Shared access to the data is maintained through a collaboration among the CEDR and PAREP projects at LBL, and UC DATA, and the UC Documents Library. Via the Sun Network File System (NFS), these data can be exported to Internet computers for direct access by the user`s application program(s).

  1. Public census data on CD-ROM at Lawrence Berkeley Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Merrill, D.W.

    1992-10-01

    The Comprehensive Epidemiologic Data Resource (CEDR) and Populations at Risk to Environmental Pollution (PAREP) projects, of the Information and Computing Sciences Division (ICSD) at Lawrence Berkeley Laboratory (LBL), are using public socio-economic and geographic data files which are available to CEDR and PAREP collaborators via LBL's computing network. At this time 70 CD-ROM diskettes (approximately 36 gigabytes) are on line via the Unix file server cedrcd. lbl. gov. Most of the files are from the US Bureau of the Census, and most pertain to the 1990 Census of Population and Housing. All the CD-ROM diskettes contain documentation in the form of ASCII text files. Printed documentation for most files is available for inspection at University of California Data and Technical Assistance (UC DATA), or the UC Documents Library. Many of the CD-ROM diskettes distributed by the Census Bureau contain software for PC compatible computers, for easily accessing the data. Shared access to the data is maintained through a collaboration among the CEDR and PAREP projects at LBL, and UC DATA, and the UC Documents Library. Via the Sun Network File System (NFS), these data can be exported to Internet computers for direct access by the user's application program(s).

  2. 45 CFR 99.5 - Filing and service of papers.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Filing and service of papers. 99.5 Section 99.5... THE CHILD CARE AND DEVELOPMENT FUND General § 99.5 Filing and service of papers. (a) An original and two copies of all papers in the proceedings shall be filed with the presiding officer. For...

  3. 43 CFR 4.702 - Transmittal of appeal file.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Transmittal of appeal file. 4.702 Section... PROCEDURES Special Rules Applicable to Other Appeals and Hearings § 4.702 Transmittal of appeal file. Within... decision is being appealed shall transmit to the Office of the Director the entire official file in...

  4. 49 CFR 554.9 - Availability of files.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Availability of files. 554.9 Section 554.9... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION STANDARDS ENFORCEMENT AND DEFECTS INVESTIGATION § 554.9 Availability of files. All files of closed or suspended investigations are available for public inspection in...

  5. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction The first data taking period of November produced a first scientific paper, and this is a very satisfactory step for Computing. It also gave the invaluable opportunity to learn and debrief from this first, intense period, and make the necessary adaptations. The alarm procedures between different groups (DAQ, Physics, T0 processing, Alignment/calibration, T1 and T2 communications) have been reinforced. A major effort has also been invested into remodeling and optimizing operator tasks in all activities in Computing, in parallel with the recruitment of new Cat A operators. The teams are being completed and by mid year the new tasks will have been assigned. CRB (Computing Resource Board) The Board met twice since last CMS week. In December it reviewed the experience of the November data-taking period and could measure the positive improvements made for the site readiness. It also reviewed the policy under which Tier-2 are associated with Physics Groups. Such associations are decided twice per ye...

  6. COMPUTING

    CERN Multimedia

    P. McBride

    It has been a very active year for the computing project with strong contributions from members of the global community. The project has focused on site preparation and Monte Carlo production. The operations group has begun processing data from P5 as part of the global data commissioning. Improvements in transfer rates and site availability have been seen as computing sites across the globe prepare for large scale production and analysis as part of CSA07. Preparations for the upcoming Computing Software and Analysis Challenge CSA07 are progressing. Ian Fisk and Neil Geddes have been appointed as coordinators for the challenge. CSA07 will include production tests of the Tier-0 production system, reprocessing at the Tier-1 sites and Monte Carlo production at the Tier-2 sites. At the same time there will be a large analysis exercise at the Tier-2 centres. Pre-production simulation of the Monte Carlo events for the challenge is beginning. Scale tests of the Tier-0 will begin in mid-July and the challenge it...

  7. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction During the past six months, Computing participated in the STEP09 exercise, had a major involvement in the October exercise and has been working with CMS sites on improving open issues relevant for data taking. At the same time operations for MC production, real data reconstruction and re-reconstructions and data transfers at large scales were performed. STEP09 was successfully conducted in June as a joint exercise with ATLAS and the other experiments. It gave good indication about the readiness of the WLCG infrastructure with the two major LHC experiments stressing the reading, writing and processing of physics data. The October Exercise, in contrast, was conducted as an all-CMS exercise, where Physics, Computing and Offline worked on a common plan to exercise all steps to efficiently access and analyze data. As one of the major results, the CMS Tier-2s demonstrated to be fully capable for performing data analysis. In recent weeks, efforts were devoted to CMS Computing readiness. All th...

  8. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion The Tier 0 infrastructure was able to repack and promptly reconstruct heavy-ion collision data. Two copies were made of the data at CERN using a large CASTOR disk pool, and the core physics sample was replicated ...

  9. COMPUTING

    CERN Multimedia

    I. Fisk

    2012-01-01

    Introduction Computing continued with a high level of activity over the winter in preparation for conferences and the start of the 2012 run. 2012 brings new challenges with a new energy, more complex events, and the need to make the best use of the available time before the Long Shutdown. We expect to be resource constrained on all tiers of the computing system in 2012 and are working to ensure the high-priority goals of CMS are not impacted. Heavy ions After a successful 2011 heavy-ion run, the programme is moving to analysis. During the run, the CAF resources were well used for prompt analysis. Since then in 2012 on average 200 job slots have been used continuously at Vanderbilt for analysis workflows. Operations Office As of 2012, the Computing Project emphasis has moved from commissioning to operation of the various systems. This is reflected in the new organisation structure where the Facilities and Data Operations tasks have been merged into a common Operations Office, which now covers everything ...

  10. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the co...

  11. PR Educators Stress Computers.

    Science.gov (United States)

    Fleming, Charles A.

    1988-01-01

    Surveys the varied roles computers play in public relations education. Asserts that, because computers are used extensively in the public relations field, students should become acquainted with the varied capabilities of computers and their role in public relations practice. (MM)

  12. Detection Of Alterations In Audio Files Using Spectrograph Analysis

    Directory of Open Access Journals (Sweden)

    Anandha Krishnan G

    2015-08-01

    Full Text Available The corresponding study was carried out to detect changes in audio file using spectrograph. An audio file format is a file format for storing digital audio data on a computer system. A sound spectrograph is a laboratory instrument that displays a graphical representation of the strengths of the various component frequencies of a sound as time passes. The objectives of the study were to find the changes in spectrograph of audio after altering them to compare altering changes with spectrograph of original files and to check for similarity and difference in mp3 and wav. Five different alterations were carried out on each audio file to analyze the differences between the original and the altered file. For altering the audio file MP3 or WAV by cutcopy the file was opened in Audacity. A different audio was then pasted to the audio file. This new file was analyzed to view the differences. By adjusting the necessary parameters the noise was reduced. The differences between the new file and the original file were analyzed. By adjusting the parameters from the dialog box the necessary changes were made. The edited audio file was opened in the software named spek where after analyzing a graph is obtained of that particular file which is saved for further analysis. The original audio graph received was combined with the edited audio file graph to see the alterations.

  13. COMPUTING

    CERN Multimedia

    Matthias Kasemann

    Overview The main focus during the summer was to handle data coming from the detector and to perform Monte Carlo production. The lessons learned during the CCRC and CSA08 challenges in May were addressed by dedicated PADA campaigns lead by the Integration team. Big improvements were achieved in the stability and reliability of the CMS Tier1 and Tier2 centres by regular and systematic follow-up of faults and errors with the help of the Savannah bug tracking system. In preparation for data taking the roles of a Computing Run Coordinator and regular computing shifts monitoring the services and infrastructure as well as interfacing to the data operations tasks are being defined. The shift plan until the end of 2008 is being put together. User support worked on documentation and organized several training sessions. The ECoM task force delivered the report on “Use Cases for Start-up of pp Data-Taking” with recommendations and a set of tests to be performed for trigger rates much higher than the ...

  14. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction A large fraction of the effort was focused during the last period into the preparation and monitoring of the February tests of Common VO Computing Readiness Challenge 08. CCRC08 is being run by the WLCG collaboration in two phases, between the centres and all experiments. The February test is dedicated to functionality tests, while the May challenge will consist of running at all centres and with full workflows. For this first period, a number of functionality checks of the computing power, data repositories and archives as well as network links are planned. This will help assess the reliability of the systems under a variety of loads, and identifying possible bottlenecks. Many tests are scheduled together with other VOs, allowing the full scale stress test. The data rates (writing, accessing and transfer¬ring) are being checked under a variety of loads and operating conditions, as well as the reliability and transfer rates of the links between Tier-0 and Tier-1s. In addition, the capa...

  15. COMPUTING

    CERN Multimedia

    P. MacBride

    The Computing Software and Analysis Challenge CSA07 has been the main focus of the Computing Project for the past few months. Activities began over the summer with the preparation of the Monte Carlo data sets for the challenge and tests of the new production system at the Tier-0 at CERN. The pre-challenge Monte Carlo production was done in several steps: physics generation, detector simulation, digitization, conversion to RAW format and the samples were run through the High Level Trigger (HLT). The data was then merged into three "Soups": Chowder (ALPGEN), Stew (Filtered Pythia) and Gumbo (Pythia). The challenge officially started when the first Chowder events were reconstructed on the Tier-0 on October 3rd. The data operations teams were very busy during the the challenge period. The MC production teams continued with signal production and processing while the Tier-0 and Tier-1 teams worked on splitting the Soups into Primary Data Sets (PDS), reconstruction and skimming. The storage sys...

  16. COMPUTING

    CERN Multimedia

    Contributions from I. Fisk

    2012-01-01

    Introduction The start of the 2012 run has been busy for Computing. We have reconstructed, archived, and served a larger sample of new data than in 2011, and we are in the process of producing an even larger new sample of simulations at 8 TeV. The running conditions and system performance are largely what was anticipated in the plan, thanks to the hard work and preparation of many people. Heavy ions Heavy Ions has been actively analysing data and preparing for conferences.  Operations Office Figure 6: Transfers from all sites in the last 90 days For ICHEP and the Upgrade efforts, we needed to produce and process record amounts of MC samples while supporting the very successful data-taking. This was a large burden, especially on the team members. Nevertheless the last three months were very successful and the total output was phenomenal, thanks to our dedicated site admins who keep the sites operational and the computing project members who spend countless hours nursing the...

  17. COMPUTING

    CERN Multimedia

    I. Fisk

    2012-01-01

      Introduction Computing activity has been running at a sustained, high rate as we collect data at high luminosity, process simulation, and begin to process the parked data. The system is functional, though a number of improvements are planned during LS1. Many of the changes will impact users, we hope only in positive ways. We are trying to improve the distributed analysis tools as well as the ability to access more data samples more transparently.  Operations Office Figure 2: Number of events per month, for 2012 Since the June CMS Week, Computing Operations teams successfully completed data re-reconstruction passes and finished the CMSSW_53X MC campaign with over three billion events available in AOD format. Recorded data was successfully processed in parallel, exceeding 1.2 billion raw physics events per month for the first time in October 2012 due to the increase in data-parking rate. In parallel, large efforts were dedicated to WMAgent development and integrati...

  18. COMPUTING

    CERN Document Server

    2010-01-01

    Introduction Just two months after the “LHC First Physics” event of 30th March, the analysis of the O(200) million 7 TeV collision events in CMS accumulated during the first 60 days is well under way. The consistency of the CMS computing model has been confirmed during these first weeks of data taking. This model is based on a hierarchy of use-cases deployed between the different tiers and, in particular, the distribution of RECO data to T1s, who then serve data on request to T2s, along a topology known as “fat tree”. Indeed, during this period this model was further extended by almost full “mesh” commissioning, meaning that RECO data were shipped to T2s whenever possible, enabling additional physics analyses compared with the “fat tree” model. Computing activities at the CMS Analysis Facility (CAF) have been marked by a good time response for a load almost evenly shared between ALCA (Alignment and Calibration tasks - highest p...

  19. COMPUTING

    CERN Multimedia

    I. Fisk

    2013-01-01

    Computing operation has been lower as the Run 1 samples are completing and smaller samples for upgrades and preparations are ramping up. Much of the computing activity is focusing on preparations for Run 2 and improvements in data access and flexibility of using resources. Operations Office Data processing was slow in the second half of 2013 with only the legacy re-reconstruction pass of 2011 data being processed at the sites.   Figure 1: MC production and processing was more in demand with a peak of over 750 Million GEN-SIM events in a single month.   Figure 2: The transfer system worked reliably and efficiently and transferred on average close to 520 TB per week with peaks at close to 1.2 PB.   Figure 3: The volume of data moved between CMS sites in the last six months   The tape utilisation was a focus for the operation teams with frequent deletion campaigns from deprecated 7 TeV MC GEN-SIM samples to INVALID datasets, which could be cleaned up...

  20. 45 CFR 79.26 - Form, filing and service of papers.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Form, filing and service of papers. 79.26 Section... CIVIL REMEDIES § 79.26 Form, filing and service of papers. (a) Form. (1) Documents filed with the ALJ shall include an original and two copies. (2) Every pleading and paper filed in the proceeding...

  1. 42 CFR 3.524 - Form, filing, and service of papers.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Form, filing, and service of papers. 3.524 Section..., filing, and service of papers. (a) Forms. (1) Unless the ALJ directs the parties to do otherwise, documents filed with the ALJ must include an original and two copies. (2) Every pleading and paper filed...

  2. Public Records 1995.

    Science.gov (United States)

    Pritchard-Schoch, Teresa

    1995-01-01

    Examines developments among public record information providers, including a shift from file acquisition to entire company acquisition. Highlights include a table of remote access to public records by state; pricing information; privacy issues; and information about the three main companies offering access to public records: LEXIS, CDB Infotek,…

  3. Design and Implementation of Log Structured FAT and ExFAT File Systems

    Directory of Open Access Journals (Sweden)

    Keshava Munegowda

    2014-08-01

    Full Text Available The File Allocation Table (FAT file system is supported in multiple Operating Systems (OS. Hence, FAT file system is universal exchange format for files/directories used in Solid State Drives (SSD and Hard disk Drives (HDD. The Microsoft Corporation introduced the new file system called Extended FAT file system (ExFAT to support larger size storage devices. The ExFAT file system is optimized to use with SSDs. But, Both FAT and ExFAT are not power fail safe. This means that the uncontrolled power loss or abrupt storage device removable from the computer system, during file system update, causes corruption of file system meta data and hence it leads to loss of data in storage device. This paper implements the Logging and Committing features to FAT and ExFAT file systems and ensures that the file system meta data is consistent across the abrupt power loss or device removal from the computer system.

  4. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction The Computing Team successfully completed the storage, initial processing, and distribution for analysis of proton-proton data in 2011. There are still a variety of activities ongoing to support winter conference activities and preparations for 2012. Heavy ions The heavy-ion run for 2011 started in early November and has already demonstrated good machine performance and success of some of the more advanced workflows planned for 2011. Data collection will continue until early December. Facilities and Infrastructure Operations Operational and deployment support for WMAgent and WorkQueue+Request Manager components, routinely used in production by Data Operations, are provided. The GlideInWMS and components installation are now deployed at CERN, which is added to the GlideInWMS factory placed in the US. There has been new operational collaboration between the CERN team and the UCSD GlideIn factory operators, covering each others time zones by monitoring/debugging pilot jobs sent from the facto...

  5. Adolescent Fertility: National File [Machine-Readable Data File].

    Science.gov (United States)

    Moore, Kristin A.; And Others

    This computer file contains recent cross sectional data on adolescent fertility in the United States for 1960, 1965, 1970, 1975 and 1980-85. The following variables are included: (1) births; (2) birth rates; (3) abortions; (4) non-marital childbearing; (5) infant mortality; and (6) low birth weight. Data for both teenagers and women aged 20-24 are…

  6. Computer input and output files associated with ground-water-flow simulations of the Albuquerque Basin, central New Mexico, 1901-94, with projections to 2020; (supplement one to U.S. Geological Survey Water-resources investigations report 94-4251)

    Science.gov (United States)

    Kernodle, J.M.

    1996-01-01

    This report presents the computer input files required to run the three-dimensional ground-water-flow model of the Albuquerque Basin, central New Mexico, documented in Kernodle and others (Kernodle, J.M., McAda, D.P., and Thorn, C.R., 1995, Simulation of ground-water flow in the Albuquerque Basin, central New Mexico, 1901-1994, with projections to 2020: U.S. Geological Survey Water-Resources Investigations Report 94-4251, 114 p.). Output files resulting from the computer simulations are included for reference.

  7. Utility launches computer information service

    Energy Technology Data Exchange (ETDEWEB)

    Beaty, W. [ed.; Ordonez, B.

    1994-12-01

    Three employees at Lee County Electric Cooperative in North Fort Meyers, Fla., have developed InterLine, an on-line computer service designed specifically for the electric utility industry. Since introducing InterLine to the public, the development team has been looking at what areas of information would be most useful to subscribers. In the initial phase, system features include forums on electrical engineering, safety and health and transmission and distribution, a library of files and the Internet gateway. If InterLIne is embraced by the electric utility industry, long range plans are to take it internationls.

  8. COMPUTING

    CERN Multimedia

    M. Kasemann

    CMS relies on a well functioning, distributed computing infrastructure. The Site Availability Monitoring (SAM) and the Job Robot submission have been very instrumental for site commissioning in order to increase availability of more sites such that they are available to participate in CSA07 and are ready to be used for analysis. The commissioning process has been further developed, including "lessons learned" documentation via the CMS twiki. Recently the visualization, presentation and summarizing of SAM tests for sites has been redesigned, it is now developed by the central ARDA project of WLCG. Work to test the new gLite Workload Management System was performed; a 4 times increase in throughput with respect to LCG Resource Broker is observed. CMS has designed and launched a new-generation traffic load generator called "LoadTest" to commission and to keep exercised all data transfer routes in the CMS PhE-DEx topology. Since mid-February, a transfer volume of about 12 P...

  9. Common File Formats.

    Science.gov (United States)

    Mills, Lauren

    2014-03-21

    An overview of the many file formats commonly used in bioinformatics and genome sequence analysis is presented, including various data file formats, alignment file formats, and annotation file formats. Example workflows illustrate how some of the different file types are typically used.

  10. The DNA Files

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-06-09

    The DNA Files is a radio documentary which disseminates genetics information over public radio. The documentaries explore subjects which include the following: How genetics affects society. How human life began and how it evolved. Could new prenatal genetic tests hold the key to disease prevention later in life? Would a national genetic data base sacrifice individual privacy? and Should genes that may lead to the cure for cancer be privately owned? This report serves as a project update for the second quarter of 1998. It includes the spring/summer 1998 newsletter, the winter 1998 newsletter, the program clock, and the latest flyer.

  11. Public census data on CD-ROM at Lawrence Berkeley Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Merrill, D.W.

    1993-01-16

    The Comprehensive Epidemiologic Data Resource (CEDR) and Populations at Risk to Environmental Pollution (PAREP) projects, of the Information and Computing Sciences Division (ICSD) at Lawrence Berkeley Laboratory (LBL), are using public socioeconomic and geographic data files which are available to CEDR and PAREP collaborators via LBL's computing network. At this time 72 CD-ROM diskettes (approximately 37 gigabytes) are on line via the Unix file server cedrcd.lbl.gov''. Most of the files are from the US Bureau of the Census, and many of these pertain to the 1990 Census of Population and Housing. All the CD-ROM diskettes contain documentation in the form of ASCII text files. In addition, printed documentation for most files is available for inspection at University of California Data and Technical Assistance (UC DATA), tel. (510) 642-6571, or the UC Documents Library, tel. (510) 642-2569, both located on the UC Berkeley Campus. Many of the CD-ROM diskettes distributed by the Census Bureau contain software for PC compatible computers, for easily accessing the data. Shared access to the data is maintained through a collaboration among the CEDR and PAREP projects at LBL, and UC DATA, and the UC Documents Library. LBL is grateful to UC DATA and the UC Documents Library for the use of their CD-ROM diskettes. Shared access to LBL facilities may be restricted in the future if costs become prohibitive. Via the Sun Network File System (NFS), these data can be exported to Internet computers for direct access by the user's application program(s). Due to the size of the files, this access method is preferred over File Transfer Protocol (FTP) access. Please contact Deane Merrill (dwmerrill lbl.gov) if you wish to make use of the data.

  12. Public census data on CD-ROM at Lawrence Berkeley Laboratory. Revision 4

    Energy Technology Data Exchange (ETDEWEB)

    Merrill, D.W.

    1993-03-12

    The Comprehensive Epidemiologic Data Resource (CEDR) and Populations at Risk to Environmental Pollution (PAREP) projects, of the Information and Computing sciences Division (ICSD) at Lawrence Berkeley Laboratory (LBL), are using public socioeconomic and geographic data files which are available to CEDR and PAREP collaborators via LBL`s computing network. At this time 89 CD-ROM diskettes (approximately 45 gigabytes) are on line via the Unix file server cedrcd.lbl.gov. Most of the files are from the US Bureau of the Census, and many of these pertain to the 1990 Census of Population and Housing. All the CD-ROM diskettes contain documentation in the form of ASCII text files. In addition, printed documentation for most files is available for inspection at University of California Data and Technical Assistance (UC DATA), tel. (510) 642-6571, or the UC Documents Library, tel. (510) 642-2569, both located on the UC Berkeley Campus. Many of the CD-ROM diskettes distributed by the Census Bureau contain software for PC compatible computers, for easily accessing the data. Shared access to the data is maintained through a collaboration among the CEDR and PAREP projects at LBL, and UC DATA, and the UC Documents Library. LBL is grateful to UC DATA and the UC Documents Library for the use of their CD-ROM diskettes. Shared access to LBL facilities may be restricted in the future if costs become prohibitive. Via the Sun Network File System (NFS), these data can be exported to Internet computers for direct access by the user`s application program(s). Due to the size of the files, this access method is preferred over File Transfer Protocol (FTP) access.

  13. Public census data on CD-ROM at Lawrence Berkeley Laboratory. Revision 3

    Energy Technology Data Exchange (ETDEWEB)

    Merrill, D.W.

    1993-01-16

    The Comprehensive Epidemiologic Data Resource (CEDR) and Populations at Risk to Environmental Pollution (PAREP) projects, of the Information and Computing Sciences Division (ICSD) at Lawrence Berkeley Laboratory (LBL), are using public socioeconomic and geographic data files which are available to CEDR and PAREP collaborators via LBL`s computing network. At this time 72 CD-ROM diskettes (approximately 37 gigabytes) are on line via the Unix file server ``cedrcd.lbl.gov``. Most of the files are from the US Bureau of the Census, and many of these pertain to the 1990 Census of Population and Housing. All the CD-ROM diskettes contain documentation in the form of ASCII text files. In addition, printed documentation for most files is available for inspection at University of California Data and Technical Assistance (UC DATA), tel. (510) 642-6571, or the UC Documents Library, tel. (510) 642-2569, both located on the UC Berkeley Campus. Many of the CD-ROM diskettes distributed by the Census Bureau contain software for PC compatible computers, for easily accessing the data. Shared access to the data is maintained through a collaboration among the CEDR and PAREP projects at LBL, and UC DATA, and the UC Documents Library. LBL is grateful to UC DATA and the UC Documents Library for the use of their CD-ROM diskettes. Shared access to LBL facilities may be restricted in the future if costs become prohibitive. Via the Sun Network File System (NFS), these data can be exported to Internet computers for direct access by the user`s application program(s). Due to the size of the files, this access method is preferred over File Transfer Protocol (FTP) access. Please contact Deane Merrill (dwmerrill@lbl.gov) if you wish to make use of the data.

  14. Factors influencing health professions students' use of computers for data analysis at three Ugandan public medical schools: a cross-sectional survey.

    Science.gov (United States)

    Munabi, Ian G; Buwembo, William; Bajunirwe, Francis; Kitara, David Lagoro; Joseph, Ruberwa; Peter, Kawungezi; Obua, Celestino; Quinn, John; Mwaka, Erisa S

    2015-02-25

    Effective utilization of computers and their applications in medical education and research is of paramount importance to students. The objective of this study was to determine the association between owning a computer and use of computers for research data analysis and the other factors influencing health professions students' computer use for data analysis. We conducted a cross sectional study among undergraduate health professions students at three public universities in Uganda using a self-administered questionnaire. The questionnaire was composed of questions on participant demographics, students' participation in research, computer ownership, and use of computers for data analysis. Descriptive and inferential statistics (uni-variable and multi- level logistic regression analysis) were used to analyse data. The level of significance was set at 0.05. Six hundred (600) of 668 questionnaires were completed and returned (response rate 89.8%). A majority of respondents were male (68.8%) and 75.3% reported owning computers. Overall, 63.7% of respondents reported that they had ever done computer based data analysis. The following factors were significant predictors of having ever done computer based data analysis: ownership of a computer (adj. OR 1.80, p = 0.02), recently completed course in statistics (Adj. OR 1.48, p =0.04), and participation in research (Adj. OR 2.64, p computer, participation in research and undertaking courses in research methods influence undergraduate students' use of computers for research data analysis. Students are increasingly participating in research, and thus need to have competencies for the successful conduct of research. Medical training institutions should encourage both curricular and extra-curricular efforts to enhance research capacity in line with the modern theories of adult learning.

  15. [Digital library for archiving files of radiology and medical imaging].

    Science.gov (United States)

    Duvauferrier, R; Rambeau, M; Moulène, F

    1993-01-01

    The Conseil des Enseignants de Radiologie de France in collaboration with the Ilab-TSI company and Schering laboratories has developed a computer programme allowing the storage and consultation of radiological teaching files. This programme, developed on Macintosh from standard Hypercard and Quicktime applications, allows, in consultation mode, the multicriteria search and visualisation of selected radiological files. In the author mode, new files can be included after digitalizing the author's own images or after obtaining images from another image library. This programme, which allows juxtaposition of digitalised radiological files, is designed to be extremely open and can be easily combined with other computer-assisted teaching or computer-assisted presentation applications.

  16. 43 CFR 4.1181 - Who may file.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Who may file. 4.1181 Section 4.1181 Public Lands: Interior Office of the Secretary of the Interior DEPARTMENT HEARINGS AND APPEALS PROCEDURES...) Or 521(a)(3) Orders of Cessation § 4.1181 Who may file. (a) An application for review of an order...

  17. Computer Viruses. Technology Update.

    Science.gov (United States)

    Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp.

    This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…

  18. 5 CFR 2634.201 - General requirements, filing dates, and extensions.

    Science.gov (United States)

    2010-01-01

    ... EXECUTIVE BRANCH FINANCIAL DISCLOSURE, QUALIFIED TRUSTS, AND CERTIFICATES OF DIVESTITURE Persons Required To File Public Financial Disclosure Reports § 2634.201 General requirements, filing dates, and extensions... days shall file a public financial disclosure report containing the information prescribed in subpart...

  19. HUD GIS Boundary Files

    Data.gov (United States)

    Department of Housing and Urban Development — The HUD GIS Boundary Files are intended to supplement boundary files available from the U.S. Census Bureau. The files are for community planners interested in...

  20. Parallel file system with metadata distributed across partitioned key-value store c

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John M.; Faibish, Sorin; Grider, Gary; Torres, Aaron

    2017-09-19

    Improved techniques are provided for storing metadata associated with a plurality of sub-files associated with a single shared file in a parallel file system. The shared file is generated by a plurality of applications executing on a plurality of compute nodes. A compute node implements a Parallel Log Structured File System (PLFS) library to store at least one portion of the shared file generated by an application executing on the compute node and metadata for the at least one portion of the shared file on one or more object storage servers. The compute node is also configured to implement a partitioned data store for storing a partition of the metadata for the shared file, wherein the partitioned data store communicates with partitioned data stores on other compute nodes using a message passing interface. The partitioned data store can be implemented, for example, using Multidimensional Data Hashing Indexing Middleware (MDHIM).

  1. Computer input and output files associated with ground-water-flow simulations of the Albuquerque Basin, central New Mexico, 1901-95, with projections to 2020; (supplement three to U.S. Geological Survey Water-resources investigations report 94-4251)

    Science.gov (United States)

    Kernodle, J.M.

    1996-01-01

    This report presents the computer input files required to run the three-dimensional ground-water-flow model of the Albuquerque Basin, central New Mexico, documented in Kernodle and others (Kernodle, J.M., McAda, D.P., and Thorn, C.R., 1995, Simulation of ground-water flow in the Albuquerque Basin, central New Mexico, 1901-1994, with projections to 2020: U.S. Geological Survey Water-Resources Investigations Report 94-4251, 114 p.) and revised by Kernodle (Kernodle, J.M., 1998, Simulation of ground-water flow in the Albuquerque Basin, 1901-95, with projections to 2020 (supplement two to U.S. Geological Survey Water-Resources Investigations Report 94-4251): U.S. Geological Survey Open-File Report 96-209, 54 p.). Output files resulting from the computer simulations are included for reference.

  2. Aspects on Transfer of Aided - Design Files

    Science.gov (United States)

    Goanta, A. M.; Anghelache, D. G.

    2016-08-01

    At this stage of development of hardware and software, each company that makes design software packages has a certain type of file created and customized in time to distinguish that company from its competitors. Thus today are widely known the DWG files belonging AutoCAD, IPT / IAM belonging to Inventor, PAR / ASM of Solid Edge's, PRT from the NX and so on. Behind every type of file there is a mathematical model which is common to more types of files. A specific aspect of the computer -aided design is that all softwares are working with both individual parts and assemblies, but their approach is different in that some use the same type of file both for each part and for the whole (PRT ), while others use different types of files (IPT / IAM, PAR / ASM, etc.). Another aspect of the computer -aided design is to transfer files between different companies which use different software packages or even the same software package but in different versions. Each of these situations generates distinct issues. Thus, to solve the partial reading by a project different from the native one, transfer files of STEP and IGES type are used

  3. Schools (Students) Exchanging CAD/CAM Files over the Internet.

    Science.gov (United States)

    Mahoney, Gary S.; Smallwood, James E.

    This document discusses how students and schools can benefit from exchanging computer-aided design/computer-aided manufacturing (CAD/CAM) files over the Internet, explains how files are exchanged, and examines the problem of selected hardware/software incompatibility. Key terms associated with information search services are defined, and several…

  4. Disaggregating the Truth: A Re-Analysis of the Costs and Benefits of Michigan's Public Universities. Professional File. Number 125, Summer 2012

    Science.gov (United States)

    Daun-Barnett, Nathan J.

    2012-01-01

    For more than 50 years, human capital theory has been the cornerstone for understanding the value of investing in individuals' productive capacities in terms of both personal social and economic gain and the collective benefits that accrue to society. Vedder and Denhart (2007) challenge the hypothesis that public investment in higher education…

  5. Public Access Points, Our current file was compiled from our parcel mapping & locating on records & maps, areas of public access. Areas have been reviewed by the DNR, Published in 2011, Not Applicable scale, Chippewa County.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Public Access Points dataset, published at Not Applicable scale, was produced all or in part from Field Survey/GPS information as of 2011. It is described as...

  6. Results of an Experimental Program to Provide Low Cost Computer Searches of the NASA Information File to University Graduate Students in the Southeast. Final Report.

    Science.gov (United States)

    Smetana, Frederick O.; Phillips, Dennis M.

    In an effort to increase dissemination of scientific and technological information, a program was undertaken whereby graduate students in science and engineering could request a computer-produced bibliography and/or abstracts of documents identified by the computer. The principal resource was the National Aeronautics and Space Administration…

  7. On the integration of file management of colleges and universities%浅议高等院校文档一体化管理。

    Institute of Scientific and Technical Information of China (English)

    易明; 黄仁静

    2012-01-01

    With the development of internet and the wide use of computer and the popularization of no paper work by the government, file integration has been a new subject in the development of new century file management. And then how to make proper management of electronic document to guarantee the smooth development of the popularization also becomes a new subject. File plays the pillar part in all the work operation and the main media for the leaders to dispose and push work. All of the policy and works should be implemented through file. File work is the most important part of the work of public institutions, and colleges and universities. In our daily works, we should enhance the file management to achieve maximum results with little effort by file integration management mode.%政府无纸化办公、档案文档一体化已成为新世纪档案事业发展的新课题。文件是日常工作运行的重要支柱,是贯彻落实上级决策、意图的主要载体,各项大政要略和工作思路都要靠文件来传达。在日常工作中正确应用文档一体化管理模式,将使我们的工作事半功倍。

  8. panMetaDocs, eSciDoc, and DOIDB—An Infrastructure for the Curation and Publication of File-Based Datasets for GFZ Data Services

    Directory of Open Access Journals (Sweden)

    Damian Ulbricht

    2016-03-01

    Full Text Available The GFZ German Research Centre for Geosciences is the national laboratory for Geosciences in Germany. As part of the Helmholtz Association, providing and maintaining large-scale scientific infrastructures are an essential part of GFZ activities. This includes the generation of significant volumes and numbers of research data, which subsequently become source materials for data publications. The development and maintenance of data systems is a key component of GFZ Data Services to support state-of-the-art research. A challenge lies not only in the diversity of scientific subjects and communities, but also in different types and manifestations of how data are managed by research groups and individual scientists. The data repository of GFZ Data Services provides a flexible IT infrastructure for data storage and publication, including minting of digital object identifiers (DOI. It was built as a modular system of several independent software components linked together through Application Programming Interfaces (APIs provided by the eSciDoc framework. Principal application software are panMetaDocs for data management and DOIDB for logging and moderating data publications activities. Wherever possible, existing software solutions were integrated or adapted. A summary of our experiences made in operating this service is given. Data are described through comprehensive landing pages and supplementary documents, like journal articles or data reports, thus augmenting the scientific usability of the service.

  9. Text Classification: Classifying Plain Source Files with Neural Network

    Directory of Open Access Journals (Sweden)

    Jaromir Veber

    2010-10-01

    Full Text Available The automated text file categorization has an important place in computer engineering, particularly in the process called data management automation. A lot has been written about text classification and the methods allowing classification of these files are well known. Unfortunately most studies are theoretical and for practical implementation more research is needed. I decided to contribute with a research focused on creating of a classifier for different kinds of programs (source files, scripts…. This paper will describe practical implementation of the classifier for text files depending on file content.

  10. Conservative Public Interest Litigation

    Science.gov (United States)

    Pell, Terence J.

    2007-01-01

    The idea that lawsuits can move a public as well as a legal agenda is not new. In recent years, conservatives have brought high profile lawsuits designed both to vindicate the rights of an individual plaintiff and to educate the public about an important issue. For example, lawsuits filed nearly 10 years ago against the University of Michigan's…

  11. 76 FR 67418 - Request for Comments on NIST Special Publication 500-293, US Government Cloud Computing...

    Science.gov (United States)

    2011-11-01

    .... SUPPLEMENTARY INFORMATION: The National Institute of Standards and Technology (NIST) has a technology leadership role in support of a secure and effectively adopted Cloud Computing model \\1\\ to reduce costs and improve services. This role is described ] in the 2011 Federal Cloud Computing Strategy \\2\\ as ``a central...

  12. Provider of Services File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The POS file consists of two data files, one for CLIA labs and one for 18 other provider types. The file names are CLIA and OTHER. If downloading the file, note it...

  13. Assessing and Filing the Gap as a New Mode of Governance, lessons from a Preliminary Study carried out in the Cosenza's Public Prosecutors' Office

    Directory of Open Access Journals (Sweden)

    Diana Piana

    2012-06-01

    Full Text Available In all European countries courts and public prosecutor offices have been undergoing a long and comprehensive process of reform, target several different components of their organization and management. This phenomenon can be explained as the outcome of two combined forces: an increase demand of justice and a pressure from the international and supranational institutions. Accordingly, innovation has become a major issue in the judicial sector. Despite the attention devoted to it, much less effort has been made to comprehend the mechanisms that make organizations innovative. To what extent is leadership important? How may different organizational cultures facilitate or create obstacles to innovation? And to what extent can innovation be implemented through a top down approach in a peculiar organization, such as a judicial office? This article tells the story of a case study on a public prosecutors’ office located in the South of Italy. The pilot study has been framed and conducted as both normative and empirical in its own nature. Moreover, it represents a case study with a certain number of policy effects, as it turned into a roadmap which was adopted by the judicial office to improve its own organization and human resource management. This is the first study carried out in Italy using such methods with the objective to:a describe the implementation of organizational innovation (in this respect there had already been a study of the General Registry Office,b map intra-organizational routines and inter-connections between administration and the General Registry Office and between the GRO and the criminal records Office etc;c Identify skills to adapt and learn skills from daily routines and execution of specific tasks, as they are done in all public sectors.- If you really want to understand something, try first to change it - Thomas Eliot

  14. The Administrative-Jurisdictional Procedure for Solving Complaints Filed under the Provisions of the Law on Remedies and Appeals Concerning the Award of Public Procurement and Concession Contracts

    Directory of Open Access Journals (Sweden)

    Vasilica Negrut

    2016-08-01

    Full Text Available In this study, whose overall objective was built on a very topical issue, that of remedies and appeal procedures concerning the award of public procurement contracts, the sector contracts, works concession and service concession contracts, we intend to analyze the aspects relating to prior notification, period for bringing a complaint by administrative-jurisdictional way, its resolutions, solutions that the National Council for solving Complaints can give, the appeal against the decisions of this structure-organism independent with administrative – jurisdictional activity, so as in a future article to have as analysis subject the matters that concern the remedies of the judicial system. In the study we used content analysis and descriptive documentary research of the documents relevant to this matter.

  15. 78 FR 53124 - First Responder Network Authority Filing

    Science.gov (United States)

    2013-08-28

    ...On August 19, 2013, the Public Safety and Homeland Security Bureau of the Federal Communications Commission (Commission) released a public notice inviting public comment on a filing submitted by the First Responder Network Authority (FirstNet) on August 2, 2013, in PS Docket 12-94. The filing addressed consolidation of technical service rules for the 758-769 and 788-799 MHz bands,

  16. Agricultural Internet Public Opinion Monitoring System under Cloud Computing Environment%云环境下的农业网络舆情监测系统研究

    Institute of Scientific and Technical Information of China (English)

    陈涛; 刘世洪

    2015-01-01

    For a large number of agricultural information produced by micro-blog, BBS and online social network media, and the challenges brought by public opinion monitoring, an Agricultural Internet Public Opinion Monitoring System (AIPOMS) under the cloud computing environment was proposed. This paper focused on the model of Internet public opinion monitoring, including public opinion information collection, public opinion analysis and public opinion services. It can mine and analyze large scale collected data, and realize the recognition of sensitive topics, detection and tracking of hot topics, and visualization of analysis results. The system can provide the scientific basis for agricultural departments and decision makers to timely detect hot information, sensitive information and the trend of public opinion, and have great significance in the field of agricultural application.%针对微博、论坛等社会网络媒体产生的大量涉农信息,以及舆论监测所带来的挑战,提出建立云环境下农业网络舆情监测系统。重点描述了舆情监测的模型,包括舆情信息采集、舆情分析和舆情服务三个方面。该系统能够对大规模数据采集数据进行挖掘、分析,实现对舆情敏感话题识别、热点话题发现与追踪,并且分析结果可视化展示。为农业相关部门和决策者及时发现热点信息、敏感信息、舆情趋势分析提供科学依据,在农业应用领域具有重要意义。

  17. Further computer appreciation

    CERN Document Server

    Fry, T F

    2014-01-01

    Further Computer Appreciation is a comprehensive cover of the principles and aspects in computer appreciation. The book starts by describing the development of computers from the first to the third computer generations, to the development of processors and storage systems, up to the present position of computers and future trends. The text tackles the basic elements, concepts and functions of digital computers, computer arithmetic, input media and devices, and computer output. The basic central processor functions, data storage and the organization of data by classification of computer files,

  18. 76 FR 68257 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-11-03

    ... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B... of Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart...

  19. 76 FR 35939 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-06-20

    ... for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart...

  20. 77 FR 46146 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-08-02

    ... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B... Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B...

  1. 77 FR 39793 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2012-07-05

    ... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B... Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B...

  2. 76 FR 35938 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-06-20

    ... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B... Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B...

  3. Benchmarking File System Benchmarking: It *IS* Rocket Science

    OpenAIRE

    Seltzer, Margo I.; Tarasov, Vasily; Bhanage, Saumitra; Zadok, Erez

    2011-01-01

    The quality of file system benchmarking has not improved in over a decade of intense research spanning hundreds of publications. Researchers repeatedly use a wide range of poorly designed benchmarks, and in most cases, develop their own ad-hoc benchmarks. Our community lacks a definition of what we want to benchmark in a file system. We propose several dimensions of file system benchmarking and review the wide range of tools and techniques in widespread use. We experimentally show that even t...

  4. 计算机等级考试与高校计算机公共课教学研究%Teaching of Public Course of Computer and Computer Grade Examination in Colleges and Universities

    Institute of Scientific and Technical Information of China (English)

    朱琳; 马蓉; 周钧

    2013-01-01

    In this paper, the relationship between the National Computer Rank Examination and university computer public basic courses teaching and the existing problems are discussed, and how to strengthen the public computer course teaching in the future, the relationship between science and correct processing and computer grade examination provides some opinions. Role in promoting the development of teaching focuses on computer grade examination, as well as computer grade examination negative teaching-oriented, and how to solve the problem of the contradiction between them. And results of the application of computer-aided education, the purpose is to make basic computer teaching and grade examination work together to promote common development, both for educational activities to promote the development of education, in order to create a good educational environment, help students better in school more good, efficient learning.%  本文就目前全国计算机等级考试与高校计算机公共基础课的教学的关系及存在的问题作了一些探讨,并对今后如何加强计算机公共课教学,科学正确的处理与计算机等级考试的关系提出了一些观点。重点阐述计算机等级考试对教学发展的促进作用,以及计算机等级考试对教学的负面导向,以及如何解决它们之间的矛盾问题。应用计算机辅助教育的技术和成果,目的是使计算机基础教学与等级考试共同促进、共同发展,使两者都更好的为教学活动服务,促进教育事业的发展,为创造一个良好的教育环境,有助于学生更好的在学校更加良好、高效率的学习。

  5. Exploration on the Public Computer Room Management Based on PowerShell%基于PowerShell的公共机房管理探索

    Institute of Scientific and Technical Information of China (English)

    郭亮; 郭海智; 谢光

    2015-01-01

    It is an important problem to improve the response ability in the management of public computer room. The applica-tion of the third party management software increases the operating costs and extends the time to solve the problem. Taking the na-tional computer grade examination as an example, PowerShell is used to complete a variety of settings quickly without considering operating system versions, to meet the needs of most public computer room management and save the manpower and material re-sources.%提高公共机房的快速反应能力是机房管理面临的重要问题。第三方管理软件的使用提高了运营成本并延长了解决问题的时间。本文以全国计算机等级考试环境为例,利用PowerShell快速完成各种设置而无需考虑操作系统各种版本,满足公共机房的大部分管理工作需要并节省了人力物力。

  6. Protecting your files on the AFS file system

    CERN Multimedia

    2011-01-01

    The Andrew File System is a world-wide distributed file system linking hundreds of universities and organizations, including CERN. Files can be accessed from anywhere, via dedicated AFS client programs or via web interfaces that export the file contents on the web. Due to the ease of access to AFS it is of utmost importance to properly protect access to sensitive data in AFS. As the use of AFS access control mechanisms is not obvious to all users, passwords, private SSH keys or certificates have been exposed in the past. In one specific instance, this also led to bad publicity due to a journalist accessing supposedly "private" AFS folders (SonntagsZeitung 2009/11/08). This problem does not only affect the individual user but also has a bad impact on CERN's reputation when it comes to IT security. Therefore, all departments and LHC experiments agreed in April 2010 to apply more stringent folder protections to all AFS user folders. The goal of this data protection policy is to assist users in...

  7. Protecting your files on the DFS file system

    CERN Multimedia

    Computer Security Team

    2011-01-01

    The Windows Distributed File System (DFS) hosts user directories for all NICE users plus many more data.    Files can be accessed from anywhere, via a dedicated web portal (http://cern.ch/dfs). Due to the ease of access to DFS with in CERN it is of utmost importance to properly protect access to sensitive data. As the use of DFS access control mechanisms is not obvious to all users, passwords, certificates or sensitive files might get exposed. At least this happened in past to the Andrews File System (AFS) - the Linux equivalent to DFS) - and led to bad publicity due to a journalist accessing supposedly "private" AFS folders (SonntagsZeitung 2009/11/08). This problem does not only affect the individual user but also has a bad impact on CERN's reputation when it comes to IT security. Therefore, all departments and LHC experiments agreed recently to apply more stringent protections to all DFS user folders. The goal of this data protection policy is to assist users in pro...

  8. Provider Specific Data for Public Use in SAS Format

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Fiscal Intermediary maintains the Provider Specific File (PSF). The file contains information about the facts specific to the provider that affects computations...

  9. Decay data file based on the ENSDF file

    Energy Technology Data Exchange (ETDEWEB)

    Katakura, J. [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    1997-03-01

    A decay data file with the JENDL (Japanese Evaluated Nuclear Data Library) format based on the ENSDF (Evaluated Nuclear Structure Data File) file was produced as a tentative one of special purpose files of JENDL. The problem using the ENSDF file as primary source data of the JENDL decay data file is presented. (author)

  10. 45 CFR 1705.3 - Procedures for requests pertaining to individual records in the D/AC File.

    Science.gov (United States)

    2010-10-01

    ... records in the D/AC File. 1705.3 Section 1705.3 Public Welfare Regulations Relating to Public Welfare... for requests pertaining to individual records in the D/AC File. (a) An individual who wishes to know whether the D/AC File contains a record pertaining to him or her shall submit a written request to...

  11. A proposal for a computer-based framework of support for public health in the management of biological incidents: the Czech Republic experience.

    Science.gov (United States)

    Bures, Vladimír; Otcenásková, Tereza; Cech, Pavel; Antos, Karel

    2012-11-01

    Biological incidents jeopardising public health require decision-making that consists of one dominant feature: complexity. Therefore, public health decision-makers necessitate appropriate support. Based on the analogy with business intelligence (BI) principles, the contextual analysis of the environment and available data resources, and conceptual modelling within systems and knowledge engineering, this paper proposes a general framework for computer-based decision support in the case of a biological incident. At the outset, the analysis of potential inputs to the framework is conducted and several resources such as demographic information, strategic documents, environmental characteristics, agent descriptors and surveillance systems are considered. Consequently, three prototypes were developed, tested and evaluated by a group of experts. Their selection was based on the overall framework scheme. Subsequently, an ontology prototype linked with an inference engine, multi-agent-based model focusing on the simulation of an environment, and expert-system prototypes were created. All prototypes proved to be utilisable support tools for decision-making in the field of public health. Nevertheless, the research revealed further issues and challenges that might be investigated by both public health focused researchers and practitioners.

  12. 29 CFR 4000.28 - What if I send a computer disk?

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false What if I send a computer disk? 4000.28 Section 4000.28... I send a computer disk? (a) In general. We determine your filing or issuance date for a computer... paragraph (b) of this section. (1) Filings. For computer-disk filings, we may treat your submission...

  13. Trends of Mobile Learning in Computing Education from 2006 to 2014: A Systematic Review of Research Publications

    Science.gov (United States)

    Anohah, Ebenezer; Oyelere, Solomon Sunday; Suhonen, Jarkko

    2017-01-01

    The majority of the existing research regarding mobile learning in computing education has primarily focused on studying the effectiveness of, and in some cases reporting about, implemented mobile learning solutions. However, it is equally important to explore development and application perspectives on the integration of mobile learning into…

  14. Trends of Mobile Learning in Computing Education from 2006 to 2014: A Systematic Review of Research Publications

    Science.gov (United States)

    Anohah, Ebenezer; Oyelere, Solomon Sunday; Suhonen, Jarkko

    2017-01-01

    The majority of the existing research regarding mobile learning in computing education has primarily focused on studying the effectiveness of, and in some cases reporting about, implemented mobile learning solutions. However, it is equally important to explore development and application perspectives on the integration of mobile learning into…

  15. ActSds and OdfSds: Programs for Converting INTERACT and The Observer Data Files into SDIS Timed-Event Sequential Data Files

    OpenAIRE

    Bakeman, Roger; Quera, Vicenç

    2008-01-01

    Programs for converting Mangold International’s INTERACT and Noldus Information Technology’s The Observer data files to Sequential Data Interchange Standard (SDIS) timed-event sequential data files are described. Users who convert their INTERACT or The Observer data files can then take advantage of various flexible and powerful data modification and computational procedures available in the Generalized Sequential Querier (GSEQ), a program that assumes SDIS-formatted files.

  16. ActSds and OdfSds: programs for converting INTERACT and The Observer data files into SDIS timed-event sequential data files.

    Science.gov (United States)

    Bakeman, Roger; Quera, Vicenç

    2008-08-01

    In this article, we describe programs for converting Mangold International's INTERACT and Noldus Information Technology's The Observer data files to sequential data interchange standard (SDIS) timed-event sequential data files. Users who convert their INTERACT or The Observer data files can then take advantage of various flexible and powerful data modification and computational procedures available in the Generalized Sequential Querier, a program that assumes SDIS-formatted files.

  17. Practice for New Assessment Method of Computer Public Courses%计算机公共课新考核方法的实践

    Institute of Scientific and Technical Information of China (English)

    白伟

    2011-01-01

    By analyzing the status of public computer classes and its bottleneck of assessment,some methods of new assessment are explored to further improve the existing appraisal system which can make the assessment both fair and reasonable and a more realistic evaluation of a student's computer capabilities,which can reduce the teachers' workload while stimulate students' learning interests.%通过分析计算机公共课目前授课现状以及面临的考核瓶颈,提出新的考核方法,进一步完善现有的考核评价体系.使该体系能够公平、合理和更真实地反映一个学生的计算机能力.在减轻教师工作量的同时,又能激发学生的学习兴趣.

  18. 75 FR 55318 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-09-10

    .... Description: New Brunswick Power Generation Corporation submits tariff filing per 35.12: NB Power MBR Tariff... submits application for authorization under Section 203 of the Federal Power Act. Filed Date: 08/26/2010... Section 203 of the Federal Power Act of Central Vermont Public Service Corporation for the Merger...

  19. 42 CFR 84.40 - Quality control plans; filing requirements.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Quality control plans; filing requirements. 84.40... Control § 84.40 Quality control plans; filing requirements. As a part of each application for approval or... proposed quality control plan which shall be designed to assure the quality of respiratory...

  20. 45 CFR 213.5 - Filing and service of papers.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Filing and service of papers. 213.5 Section 213.5... and service of papers. (a) All papers in the proceedings shall be filed with the FSA Hearing Clerk, in...) All papers in the proceedings shall be served on all parties by personal delivery or by mail....

  1. 76 FR 43206 - Electronic Tariff Filing System (ETFS)

    Science.gov (United States)

    2011-07-20

    ... public reviewing the tariff by including some descriptive information on the Title page of the tariff... nondominant carriers to research their previously filed tariff revisions to include different transmittal... by revising paragraphs (b) and (e) to read as follows: Sec. 61.14 Method of filing...

  2. 42 CFR 405.1120 - Filing briefs with the MAC.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false Filing briefs with the MAC. 405.1120 Section 405....1120 Filing briefs with the MAC. Upon request, the MAC will give the party requesting review, as well... ending with the date the brief is received by the MAC will not be counted toward the adjudication...

  3. 42 CFR 423.2120 - Filing briefs with the MAC.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false Filing briefs with the MAC. 423.2120 Section 423... (CONTINUED) MEDICARE PROGRAM VOLUNTARY MEDICARE PRESCRIPTION DRUG BENEFIT Reopening, ALJ Hearings, MAC review, and Judicial Review § 423.2120 Filing briefs with the MAC. Upon request, the MAC will give the...

  4. Tom Tabor, the owner of Tabor Communications, presents Wolfgang von Rüden with the Editors Choice Award of HPCwire, which was awarded to CERN for its commitment to educating the public about high-performance computing.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    Tom Tabor, the owner of Tabor Communications, presents Wolfgang von Rüden with the Editors Choice Award of HPCwire, which was awarded to CERN for its commitment to educating the public about high-performance computing.

  5. 18 CFR 341.1 - Electronic filing of tariffs and related materials.

    Science.gov (United States)

    2010-04-01

    ... Electronic filing of tariffs and related materials. (a) General rule. Filings of tariff publications and... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Electronic filing of tariffs and related materials. 341.1 Section 341.1 Conservation of Power and Water Resources...

  6. 42 CFR 1005.11 - Form, filing and service of papers.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 5 2010-10-01 2010-10-01 false Form, filing and service of papers. 1005.11 Section... and service of papers. (a) Forms. (1) Unless the ALJ directs the parties to do otherwise, documents filed with the ALJ will include an original and two copies. (2) Every pleading and paper filed in...

  7. 45 CFR 160.524 - Form, filing, and service of papers.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Form, filing, and service of papers. 160.524..., and service of papers. (a) Forms. (1) Unless the ALJ directs the parties to do otherwise, documents filed with the ALJ must include an original and two copies. (2) Every pleading and paper filed in...

  8. 43 CFR 35.26 - Form, filing and service of papers.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Form, filing and service of papers. 35.26... FRAUDULENT CLAIMS AND STATEMENTS § 35.26 Form, filing and service of papers. (a) Form. (1) Every pleading and paper filed in the proceeding shall contain a caption setting forth the title of the action, the...

  9. 17 CFR 200.20c - Office of Filings and Information Services.

    Science.gov (United States)

    2010-04-01

    ... Information Services. 200.20c Section 200.20c Commodity and Securities Exchanges SECURITIES AND EXCHANGE... General Organization § 200.20c Office of Filings and Information Services. The Office of Filings and Information Services is responsible for the receipt and initial handling of all public documents filed at...

  10. Standard interface file handbook

    Energy Technology Data Exchange (ETDEWEB)

    Shapiro, A.; Huria, H.C. (Cincinnati Univ., OH (United States))

    1992-10-01

    This handbook documents many of the standard interface file formats that have been adopted by the US Department of Energy to facilitate communications between and portability of, various large reactor physics and radiation transport software packages. The emphasis is on those files needed for use of the VENTURE/PC diffusion-depletion code system. File structures, contents and some practical advice on use of the various files are provided.

  11. Securing the AliEn File Catalogue - Enforcing authorization with accountable file operations

    Science.gov (United States)

    Schreiner, Steffen; Bagnasco, Stefano; Sankar Banerjee, Subho; Betev, Latchezar; Carminati, Federico; Vladimirovna Datskova, Olga; Furano, Fabrizio; Grigoras, Alina; Grigoras, Costin; Mendez Lorenzo, Patricia; Peters, Andreas Joachim; Saiz, Pablo; Zhu, Jianlin

    2011-12-01

    The AliEn Grid Services, as operated by the ALICE Collaboration in its global physics analysis grid framework, is based on a central File Catalogue together with a distributed set of storage systems and the possibility to register links to external data resources. This paper describes several identified vulnerabilities in the AliEn File Catalogue access protocol regarding fraud and unauthorized file alteration and presents a more secure and revised design: a new mechanism, called LFN Booking Table, is introduced in order to keep track of access authorization in the transient state of files entering or leaving the File Catalogue. Due to a simplification of the original Access Envelope mechanism for xrootd-protocol-based storage systems, fundamental computational improvements of the mechanism were achieved as well as an up to 50% reduction of the credential's size. By extending the access protocol with signed status messages from the underlying storage system, the File Catalogue receives trusted information about a file's size and checksum and the protocol is no longer dependent on client trust. Altogether, the revised design complies with atomic and consistent transactions and allows for accountable, authentic, and traceable file operations. This paper describes these changes as part and beyond the development of AliEn version 2.19.

  12. Protecting Your Computer from Viruses

    Science.gov (United States)

    Descy, Don E.

    2006-01-01

    A computer virus is defined as a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. The existence of computer viruses--or the necessity of avoiding viruses--is part of using a computer. With the advent of the Internet, the door was opened wide for these…

  13. Health Topic XML File Description: MedlinePlus

    Science.gov (United States)

    ... Here: Home → Health Topic XML File Description: MedlinePlus URL of this page: https://medlineplus.gov/xmldescription.html ... on MedlinePlus: Not used for the public site. url - the topic URL. The URL for the corresponding ...

  14. CryptoCache: A Secure Sharable File Cache for Roaming Users

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2000-01-01

    . Conventional distributed file systems cache everything locally or not at all; there is no possibility to cache files on nearby nodes.In this paper we present the design of a secure cache system called CryptoCache that allows roaming users to cache files on untrusted file hosting servers. The system allows...... cryptography, which allows roaming users to selectively grant read and write access to others by entrusting them with respectively the public key or the private key....

  15. Efficient load rebalancing for distributed file system in Clouds

    Directory of Open Access Journals (Sweden)

    Mr. Mohan S. Deshmukh

    2016-05-01

    Full Text Available Cloud computing is an upcoming era in software industry. It’s a very vast and developing technology. Distributed file systems play an important role in cloud computing applications based on map reduce techniques. While making use of distributed file systems for cloud computing, nodes serves computing and storage functions at the same time. Given file is divided into small parts to use map reduce algorithms in parallel. But the problem lies here since in cloud computing nodes may be added, deleted or modified any time and also operations on files may be done dynamically. This causes the unequal load distribution of load among the nodes which leads to load imbalance problem in distributed file system. Newly developed distributed file system mostly depends upon central node for load distribution but this method is not helpful in large-scale and where chances of failure are more. Use of central node for load distribution creates a problem of single point dependency and chances of performance of bottleneck are more. As well as issues like movement cost and network traffic caused due to migration of nodes and file chunks need to be resolved. So we are proposing algorithm which will overcome all these problems and helps to achieve uniform load distribution efficiently. To verify the feasibility and efficiency of our algorithm we will be using simulation setup and compare our algorithm with existing techniques for the factors like load imbalance factor, movement cost and network traffic.

  16. 76 FR 55376 - Combined Notice of Filings #1

    Science.gov (United States)

    2011-09-07

    ... Service Company of New Hampshire. Description: Public Service Company of New Hampshire submits tariff filing per 35.12: Groton Wind LLC Design, Engineering and Procurement Agreement to be effective 8/26/2011...: ER11-4377-000. Applicants: Public Service Company of Colorado. Description: Public Service Company...

  17. 77 FR 76021 - Combined Notice of Filings #1

    Science.gov (United States)

    2012-12-26

    ..., Inc. Description: 2503 The Central Nebraska Public Power & Irrigation District GIA to be effective 11... Nebraska Public Power & Irrigation District GIA to be effective 11/26/2012. Filed Date: 12/17/12. Accession...: Southwest Power Pool, Inc. Description: 2505 The Central Nebraska Public Power & Irrigation District GIA...

  18. Semantic File Annotation and Retrieval on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Sadaqat Jan

    2011-01-01

    Full Text Available The rapid development of mobile technologies has facilitated users to generate and store files on mobile devices such as mobile phones and PDAs. However, it has become a challenging issue for users to efficiently and effectively search for files of interest in a mobile environment involving a large number of mobile nodes. This paper presents SemFARM framework which facilitates users to publish, annotate and retrieve files which are geographically distributed in a mobile network enabled by Bluetooth. The SemFARM framework is built on semantic web technologies in support of file retrieval on low-end mobile devices. A generic ontology is developed which defines a number of keywords, their possible domains and properties. Based on semantic reasoning, similarity degrees are computed to match user queries with published file descriptions. The SemFARM prototype is implemented using the Java mobile platform (J2ME. The performance of SemFARM is evaluated from a number of aspects in comparison with traditional mobile file systems and enhanced alternatives. Experimental results are encouraging showing the effectiveness of SemFARM in file retrieval. We can conclude that the use of semantic web technologies have facilitated file retrieval in mobile computing environments maximizing user satisfaction in searching for files of interest.

  19. The acoustics of public squares/places: A comparison between results from a computer simulation program and measurements in situ

    DEFF Research Database (Denmark)

    Paini, Dario; Rindel, Jens Holger; Gade, Anders

    2004-01-01

    In the contest of a PhD thesis, in which the main purpose is to analyse the importance of the public square/place (“agora”) as a meeting point of sound and music, with particular regard to its use for concerts (amplified or not), a first step was done, making comparisons between measurement in situ...... is not completely closed and not completely open, with highly reflecting and partially diffusing vertical surfaces (the facades) and with one totally absorbing surface (the sky). A natural application of these results will be the possibility to detect the best position for a sound source (typically an orchestra...... or a band during, for instance, music summer festivals) and the best position for the audience. A further result could be to propose some acoustic adjustments to achieve better acoustic quality by considering the acoustic parameters which are typically used for concert halls and opera houses....

  20. Influence of flexion angle of files on the decentralization of oval canals during instrumentation

    OpenAIRE

    Maria Antonieta Veloso Carvalho OLIVEIRA; Letícia Duarte ALVES; Pereira,Analice Giovani; RAPOSO,Luís Henrique Araújo; João Carlos Gabrielli BIFFI

    2015-01-01

    The aim of this study was to evaluate the influence of the flexion angle of files on the decentralization of root canals during instrumentation. Fifteen lower incisors were instrumented with Protaper Universal files and radiographed in two directions (mesiodistal and buccolingual) before and after instrumentation with a #15 K-file in position for evaluating the flexion angle of files. The specimens were also scanned before and after instrumentation using micro-computed tomography to obtain th...

  1. GEODOC: the GRID document file, record structure and data element description

    Energy Technology Data Exchange (ETDEWEB)

    Trippe, T.; White, V.; Henderson, F.; Phillips, S.

    1975-11-06

    The purpose of this report is to describe the information structure of the GEODOC file. GEODOC is a computer based file which contains the descriptive cataloging and indexing information for all documents processed by the National Geothermal Information Resource Group. This file (along with other GRID files) is managed by DBMS, the Berkeley Data Base Management System. Input for the system is prepared using the IRATE Text Editing System with its extended (12 bit) character set, or punched cards.

  2. Computer Virus Protection

    Science.gov (United States)

    Rajala, Judith B.

    2004-01-01

    A computer virus is a program--a piece of executable code--that has the unique ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file, and are spread by replicating and being sent from one individual to another. Simply having…

  3. Medicare Advantage HEDIS Public Use Files

    Data.gov (United States)

    U.S. Department of Health & Human Services — In 2012, CMS collected data from 473 Medicare managed care contracts for health care delivered in 2011. CMS considers the reporting unit for a health plan as the...

  4. Cloud Computing

    CERN Document Server

    Mirashe, Shivaji P

    2010-01-01

    Computing as you know it is about to change, your applications and documents are going to move from the desktop into the cloud. I'm talking about cloud computing, where applications and files are hosted on a "cloud" consisting of thousands of computers and servers, all linked together and accessible via the Internet. With cloud computing, everything you do is now web based instead of being desktop based. You can access all your programs and documents from any computer that's connected to the Internet. How will cloud computing change the way you work? For one thing, you're no longer tied to a single computer. You can take your work anywhere because it's always accessible via the web. In addition, cloud computing facilitates group collaboration, as all group members can access the same programs and documents from wherever they happen to be located. Cloud computing might sound far-fetched, but chances are you're already using some cloud applications. If you're using a web-based email program, such as Gmail or Ho...

  5. 75 FR 67363 - Notice of Public Information Collection(s) Being Reviewed by the Federal Communications...

    Science.gov (United States)

    2010-11-02

    ...) providers newly identified in the First Report and Order in this proceeding were required to file system... interconnected VoIP providers, must file updates to their systems security statements on file with the Commission... system filings and petitions will not be made routinely available for public inspection. Section...

  6. The FELICIA bulletin board system and the IRBIS anonymous FTP server: Computer security information sources for the DOE community. CIAC-2302

    Energy Technology Data Exchange (ETDEWEB)

    Orvis, W.J.

    1993-11-03

    The Computer Incident Advisory Capability (CIAC) operates two information servers for the DOE community, FELICIA (formerly FELIX) and IRBIS. FELICIA is a computer Bulletin Board System (BBS) that can be accessed by telephone with a modem. IRBIS is an anonymous ftp server that can be accessed on the Internet. Both of these servers contain all of the publicly available CIAC, CERT, NIST, and DDN bulletins, virus descriptions, the VIRUS-L moderated virus bulletin board, copies of public domain and shareware virus- detection/protection software, and copies of useful public domain and shareware utility programs. This guide describes how to connect these systems and obtain files from them.

  7. New orthopaedic implant management tool for computer-assisted planning, navigation, and simulation: from implant CAD files to a standardized XML-based implant database.

    Science.gov (United States)

    Sagbo, S; Blochaou, F; Langlotz, F; Vangenot, C; Nolte, L-P; Zheng, G

    2005-01-01

    Computer-Assisted Orthopaedic Surgery (CAOS) has made much progress over the last 10 years. Navigation systems have been recognized as important tools that help surgeons, and various such systems have been developed. A disadvantage of these systems is that they use non-standard formalisms and techniques. As a result, there are no standard concepts for implant and tool management or data formats to store information for use in 3D planning and navigation. We addressed these limitations and developed a practical and generic solution that offers benefits for surgeons, implant manufacturers, and CAS application developers. We developed a virtual implant database containing geometrical as well as calibration information for orthopedic implants and instruments, with a focus on trauma. This database has been successfully tested for various applications in the client/server mode. The implant information is not static, however, because manufacturers periodically revise their implants, resulting in the deletion of some implants and the introduction of new ones. Tracking these continuous changes and keeping CAS systems up to date is a tedious task if done manually. This leads to additional costs for system development, and some errors are inevitably generated due to the huge amount of information that has to be processed. To ease management with respect to implant life cycle, we developed a tool to assist end-users (surgeons, hospitals, CAS system providers, and implant manufacturers) in managing their implants. Our system can be used for pre-operative planning and intra-operative navigation, and also for any surgical simulation involving orthopedic implants. Currently, this tool allows addition of new implants, modification of existing ones, deletion of obsolete implants, export of a given implant, and also creation of backups. Our implant management system has been successfully tested in the laboratory with very promising results. It makes it possible to fill the current gap

  8. Utilizing HDF4 File Content Maps for the Cloud

    Science.gov (United States)

    Lee, Hyokyung Joe

    2016-01-01

    We demonstrate a prototype study that HDF4 file content map can be used for efficiently organizing data in cloud object storage system to facilitate cloud computing. This approach can be extended to any binary data formats and to any existing big data analytics solution powered by cloud computing because HDF4 file content map project started as long term preservation of NASA data that doesn't require HDF4 APIs to access data.

  9. Adding Data Management Services to Parallel File Systems

    Energy Technology Data Exchange (ETDEWEB)

    Brandt, Scott [Univ. of California, Santa Cruz, CA (United States)

    2015-03-04

    The objective of this project, called DAMASC for “Data Management in Scientific Computing”, is to coalesce data management with parallel file system management to present a declarative interface to scientists for managing, querying, and analyzing extremely large data sets efficiently and predictably. Managing extremely large data sets is a key challenge of exascale computing. The overhead, energy, and cost of moving massive volumes of data demand designs where computation is close to storage. In current architectures, compute/analysis clusters access data in a physically separate parallel file system and largely leave it scientist to reduce data movement. Over the past decades the high-end computing community has adopted middleware with multiple layers of abstractions and specialized file formats such as NetCDF-4 and HDF5. These abstractions provide a limited set of high-level data processing functions, but have inherent functionality and performance limitations: middleware that provides access to the highly structured contents of scientific data files stored in the (unstructured) file systems can only optimize to the extent that file system interfaces permit; the highly structured formats of these files often impedes native file system performance optimizations. We are developing Damasc, an enhanced high-performance file system with native rich data management services. Damasc will enable efficient queries and updates over files stored in their native byte-stream format while retaining the inherent performance of file system data storage via declarative queries and updates over views of underlying files. Damasc has four key benefits for the development of data-intensive scientific code: (1) applications can use important data-management services, such as declarative queries, views, and provenance tracking, that are currently available only within database systems; (2) the use of these services becomes easier, as they are provided within a familiar file

  10. Distributed Data Management and Distributed File Systems

    CERN Document Server

    Girone, Maria

    2015-01-01

    The LHC program has been successful in part due to the globally distributed computing resources used for collecting, serving, processing, and analyzing the large LHC datasets. The introduction of distributed computing early in the LHC program spawned the development of new technologies and techniques to synchronize information and data between physically separated computing centers. Two of the most challenges services are the distributed file systems and the distributed data management systems. In this paper I will discuss how we have evolved from local site services to more globally independent services in the areas of distributed file systems and data management and how these capabilities may continue to evolve into the future. I will address the design choices, the motivations, and the future evolution of the computing systems used for High Energy Physics.

  11. Virus Alert: Ten Steps to Safe Computing.

    Science.gov (United States)

    Gunter, Glenda A.

    1997-01-01

    Discusses computer viruses and explains how to detect them; discusses virus protection and the need to update antivirus software; and offers 10 safe computing tips, including scanning floppy disks and commercial software, how to safely download files from the Internet, avoiding pirated software copies, and backing up files. (LRW)

  12. File access prediction using neural networks.

    Science.gov (United States)

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.

  13. Identifiable Data Files - Name and Address File and Vital...

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Names and Addresses File and the Vital Status File are subsets of the data elements in the Enrollment Database (EDB). The particular information in each file is...

  14. Patient Assessment File (PAF)

    Data.gov (United States)

    Department of Veterans Affairs — The Patient Assessment File (PAF) database compiles the results of the Patient Assessment Instrument (PAI) questionnaire filled out for intermediate care Veterans...

  15. RRB Earnings File (RRBERN)

    Data.gov (United States)

    Social Security Administration — RRBERN contains records for all beneficiaries on the RRB's PSSVES file who's SSNs are validated through the SVES processing. Validated output is processed through...

  16. SCR Algorithm: Saving/Restoring States of File Systems

    Institute of Scientific and Technical Information of China (English)

    魏晓辉; 鞠九滨

    2000-01-01

    Fault-tolerance is very important in cluster computing and has been implemented in many famous cluster-computing systems using checkpoint/restart mechanisms. But existent check-pointing algorithms cannot restore the states of a file system when roll-backing the running of a program, so there axe many restrictions on file accesses in existent fault-tolerance systems. SCR algorithm, an algorithm based on atomic operation and consistent schedule, which can restore the states of file systems, is presented in this paper. In the SCR algorithm, system calls on file systems are classified into idem-potent operations and non-idem-potent operations. A non-idem-potent operation modifies a file system's states, while an idem-potent operation does not. SCR algorithm tracks changes of the file system states. It logs each non-idem-potent operation used by user programs and the information that can restore the operation in disks. When check-pointing roll-backing the program, SCR algorithm will revert the file system states to the last checkpoint time. By using SCR algorithm, users are allowed to use any file operation in their programs.

  17. Early Childhood Longitudinal Study, Kindergarten Class of 2010-11 (ECLS-K:2011). User's Manual for the ECLS-K:2011 Kindergarten-First Grade Data File and Electronic Codebook, Public Version. NCES 2015-078

    Science.gov (United States)

    Tourangeau, Karen; Nord, Christine; Lê, Thanh; Wallner-Allen, Kathleen; Hagedorn, Mary C.; Leggitt, John; Najarian, Michelle

    2015-01-01

    This manual provides guidance and documentation for users of the longitudinal kindergarten-first grade (K-1) data file of the Early Childhood Longitudinal Study, Kindergarten Class of 2010-11 (ECLS-K:2011). It mainly provides information specific to the first-grade rounds of data collection. Data for the ECLS-K:2011 are released in both a…

  18. 克隆软件GHOST在公用机房的应用%Application of a Clone Software Named GHOST in Public Computer Classrooms

    Institute of Scientific and Technical Information of China (English)

    张雅洁; 杨会志; 王风鸣; 姜少华

    2001-01-01

    The usage of a hard disk backup tool named GHOST is introduced,which can clone and partition a hard disk easily.The method to compress the whole hard disk or one of its partitions to an image file as well as the corresponding method to restore the image file is given.%介绍了利用GHOST硬盘拷贝工具克隆硬盘、分区,将硬盘或硬盘某一分区打包压缩成为一个映象文件及映像文件的还原方法。

  19. 77 FR 66497 - Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing and Immediate...

    Science.gov (United States)

    2012-11-05

    ... and distributing information to its Participants using its proprietary computer to computer facility (``CCF'') files. In order to reduce risk, improve transparency and increase efficiency in the announcing... the end-of-day batch CCF files. Participants that have volunteered to participate in a pilot...

  20. Computer programming and computer systems

    CERN Document Server

    Hassitt, Anthony

    1966-01-01

    Computer Programming and Computer Systems imparts a "reading knowledge? of computer systems.This book describes the aspects of machine-language programming, monitor systems, computer hardware, and advanced programming that every thorough programmer should be acquainted with. This text discusses the automatic electronic digital computers, symbolic language, Reverse Polish Notation, and Fortran into assembly language. The routine for reading blocked tapes, dimension statements in subroutines, general-purpose input routine, and efficient use of memory are also elaborated.This publication is inten

  1. Copyright and personal use of CERN’s computing infrastructure

    CERN Multimedia

    IT Department

    2009-01-01

    (La version française sera en ligne prochainement)The rules covering the personal use of CERN’s computing infrastructure are defined in Operational Circular No. 5 and its Subsidiary Rules (see http://cern.ch/ComputingRules). All users of CERN’s computing infrastructure must comply with these rules, whether they access CERN’s computing facilities from within the Organization’s site or at another location. In particular, OC5 clause 17 requires that proprietary rights (the rights in software, music, video, etc.) must be respected. The user is liable for damages resulting from non-compliance. Recently, there have been several violations of OC5, where copyright material was discovered on public world-readable disk space. Please ensure that all material under your responsibility (in particular in files owned by your account) respects proprietary rights, including with respect to the restriction of access by third parties. CERN Security Team

  2. Register file soft error recovery

    Science.gov (United States)

    Fleischer, Bruce M.; Fox, Thomas W.; Wait, Charles D.; Muff, Adam J.; Watson, III, Alfred T.

    2013-10-15

    Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.

  3. 21 CFR 514.11 - Confidentiality of data and information in a new animal drug application file.

    Science.gov (United States)

    2010-04-01

    ... application file. (a) For purposes of this section the NADA file includes all data and information submitted with or incorporated by reference in the NADA, INAD's incorporated into the NADA, supplemental NADA's... availability for public disclosure of any record in the NADA file shall be handled in accordance with the...

  4. FHEO Filed Cases

    Data.gov (United States)

    Department of Housing and Urban Development — The dataset is a list of all the Title VIII fair housing cases filed by FHEO from 1/1/2007 - 12/31/2012 including the case number, case name, filing date, state and...

  5. Next generation WLCG File Transfer Service (FTS)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    LHC experiments at CERN and worldwide utilize WLCG resources and middleware components to perform distributed computing tasks. One of the most important tasks is reliable file replication. It is a complex problem, suffering from transfer failures, disconnections, transfer duplication, server and network overload, differences in storage systems, etc. To address these problems, EMI and gLite have provided the independent File Transfer Service (FTS) and Grid File Access Library (GFAL) tools. Their development started almost a decade ago, in the meantime, requirements in data management have changed - the old architecture of FTS and GFAL cannot keep support easily these changes. Technology has also been progressing: FTS and GFAL do not fit into the new paradigms (cloud, messaging, for example). To be able to serve the next stage of LHC data collecting (from 2013), we need a new generation of  these tools: FTS 3 and GFAL 2. We envision a service requiring minimal configuration, which can dynamically adapt to the...

  6. The role of interdisciplinary research team in the impact of health apps in health and computer science publications: a systematic review.

    Science.gov (United States)

    Molina Recio, Guillermo; García-Hernández, Laura; Molina Luque, Rafael; Salas-Morera, Lorenzo

    2016-07-15

    Several studies have estimated the potential economic and social impact of the mHealth development. Considering the latest study by Institute for Healthcare Informatics, more than 165.000 apps of health and medicine are offered including all the stores from different platforms. Thus, the global mHealth market was an estimated $10.5 billion in 2014 and is expected to grow 33.5 percent annually between 2015 and 2020s. In fact, apps of Health have become the third-fastest growing category, only after games and utilities. This study aims to identify, study and evaluate the role of interdisciplinary research teams in the development of articles and applications in the field of mHealth. It also aims to evaluate the impact that the development of mHealth has had on the health and computer science field, through the study of publications in specific databases for each area which have been published until nowadays. Interdisciplinary nature is strongly connected to the scientific quality of the journal in which the work is published. This way, there are significant differences in those works that are made up by an interdisciplinary research team because of they achieve to publish in journals with higher quartiles. There are already studies that warn of methodological deficits in some studies in mHealth, low accuracy and no reproducibility. Studies of low precision and poor reproducibility, coupled with the low evidence, provide low degrees of recommendation of the interventions targeted and therefore low applicability. From the evidence of this study, working in interdisciplinary groups from different areas greatly enhances the quality of research work as well as the quality of the publications derived from its results.

  7. IaaS公有云平台调度模型研究%Research on IaaS public cloud computing platform scheduling model

    Institute of Scientific and Technical Information of China (English)

    岳冬利; 刘海涛; 孙傲冰

    2011-01-01

    A service model for laaS public cloud is created, and based on the waiting-line theory, the optimization analysis ofthe service mode, the queue length and the configuration of scheduling server is made. A scheduling model based on demand-vectors is created to filter available host machines according to the match of demand and available resource. Ifhost machines which meet the demands can' t be found firstly, the scheduling algorithm can combine with the virtual machine motivation to reallocate physical resources to guarantee the maximal available rate and usability of the whole platform. The feasibility of the algorithm is verified on our own IaaS public cloud computing platform.%抽象出IaaS公有云平台的服务模型,基于排队论对平台服务模式、队列长度、调度服务器设置等进行了优化分析.在此基础上提出一种基于IaaS平台需求向量的调度模型,根据需求与可用资源的匹配度从平台管理的物理机集合中筛选出可用的宿主机,若一次性无法找到符合要求的宿主机,平台调度算法结合虚拟机迁移操作,对物理资源进行重新分配,在实现平台资源利用率最大化的同时,保障了平台的可用性.将该算法应用在自主研发的云计算平台上,实验结果验证了该算法的可行性.

  8. Problems and Countermeasures in Personnel File Management of Public Institutions%事业单位人事档案管理中存在的问题及对策

    Institute of Scientific and Technical Information of China (English)

    刘德锋

    2015-01-01

    Making an analysis of the problems presented in personnel file management of institutions, this paper proposed measures and improvements of personnel file management in the new period, hoping to effectively enhance the level of personnel records management and improve the utilization of human resources information resources.%对事业单位人事档案管理中存在的问题进行分析,提出了新时期人事档案管理对策及改进措施,希望能够有效提升人事档案管理水平,提高人才信息资源的利用率。

  9. 75 FR 23242 - Marine Mammals; File Nos. 15498 and 15500

    Science.gov (United States)

    2010-05-03

    ... Society - Brookfield Zoo, 3300 Golf Road, Brookfield, IL 60513, and Georgia Aquarium, 225 Baker Street, NW...). File No. 15500: Georgia Aquarium requests authorization to import two male captive born bottlenose..., Georgia, for purposes of public display. Georgia Aquarium is: (1) open to the public on...

  10. 41 CFR 101-26.308 - Obtaining filing cabinets.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Obtaining filing cabinets. 101-26.308 Section 101-26.308 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 26-PROCUREMENT SOURCES...

  11. Electromagnetic Fields and Public Health: Mobile Phones

    Science.gov (United States)

    ... sheets Fact files Questions & answers Features Multimedia Contacts Electromagnetic fields and public health: mobile phones Fact sheet N° ... an estimated 6.9 billion subscriptions globally. The electromagnetic fields produced by mobile phones are classified by the ...

  12. Mathematics, Computers in Mathematics, and Gender: Public Perceptions in Context (Matemáticas, Ordenadores en Matemáticas y Género: Percepciones Públicas en Contexto

    Directory of Open Access Journals (Sweden)

    Helen J. Forgasz

    2011-09-01

    Full Text Available In Australia, national tests of mathematics achievement continue showing small but consistent gender differences in favor of boys. Societal views and pressures are among the factors invoked to explain such subtle but persistent differences. In this paper we focus directly on the beliefs of the general public about students’ learning of mathematics and the role played by computers, and then we compare the findings with data previously gathered from students. Although many considered it inappropriate to differentiate between boys and girls, gender based stereotyping was still evident. En Australia, los test nacionales del logro matemático continúan mostrando pequeñas pero consistentes diferencias de género en favor de los chicos. Las presiones y visiones sociales están entre los factores invocados para explicar tales diferencias sutiles pero persistentes. En este trabajo nos centramos directamente en las creencias del público en general acerca del aprendizaje matemático de los estudiantes y del papel desempeñado por los ordenadores, y después comparamos las conclusiones con datos previamente obtenidos de los estudiantes. Aunque muchos consideran inapropiado diferenciar entre niños y niñas, todavía son evidentes estereotipos basados en el género.

  13. Psychological Analysis of Public Library Readers in the Environment of Computer Network Resources%计算机网络资源环境下公共图书馆读者心理分析

    Institute of Scientific and Technical Information of China (English)

    梁佳

    2012-01-01

    Public libraries as a nonprofit cultural educational institution,is open for the public,all members of society who use the library resources,library services object.The Public Library of the nature of its readers with a wide range of social and mass characteristics.Understanding of computer network resources and the environment,public library readers psychology,master of readers of different ages tend to provide a basis for public library services.Public Library audience composition and reading motivation and purpose,read the psychological differences.Readers 'psychology,and the corresponding collection of literature data and network information resources services to meet readers' needs to improve the collection of documents and network resource utilization,of great significance for readers of different age groups.The computer network resources and the environment,public library readers psychological to make analysis,to further explore the computer network resources and the environment,how public libraries should better carry out the reader service work.%公共图书馆作为公益性文化教育机构,是面向社会公众开放的,凡是具有利用图书馆资源条件的一切社会成员,都是图书馆服务对象。公共图书馆的性质决定了它的读者具有广泛的社会性和群众性特点。了解计算机网络资源环境下公共图书馆的读者心理,掌握不同年龄读者的阅读倾向,能为公共图书馆读者服务工作提供依据。

  14. Publicity and public relations

    Science.gov (United States)

    Fosha, Charles E.

    1990-01-01

    This paper addresses approaches to using publicity and public relations to meet the goals of the NASA Space Grant College. Methods universities and colleges can use to publicize space activities are presented.

  15. 20 CFR 655.950 - Public access.

    Science.gov (United States)

    2010-04-01

    ....950 Public access. (a) Public examination at ETA. ETA shall compile and maintain a list of employers who filed attestations specifying the occupation(s), geographical location, and wage rate(s) attested to. The list shall be available for public inspection at the ETA office at which the attestation...

  16. Dynamic Non-Hierarchical File Systems for Exascale Storage

    Energy Technology Data Exchange (ETDEWEB)

    Long, Darrell E. [PI; Miller, Ethan L [Co PI

    2015-02-24

    This constitutes the final report for “Dynamic Non-Hierarchical File Systems for Exascale Storage”. The ultimate goal of this project was to improve data management in scientific computing and high-end computing (HEC) applications, and to achieve this goal we proposed: to develop the first, HEC-targeted, file system featuring rich metadata and provenance collection, extreme scalability, and future storage hardware integration as core design goals, and to evaluate and develop a flexible non-hierarchical file system interface suitable for providing more powerful and intuitive data management interfaces to HEC and scientific computing users. Data management is swiftly becoming a serious problem in the scientific community – while copious amounts of data are good for obtaining results, finding the right data is often daunting and sometimes impossible. Scientists participating in a Department of Energy workshop noted that most of their time was spent “...finding, processing, organizing, and moving data and it’s going to get much worse”. Scientists should not be forced to become data mining experts in order to retrieve the data they want, nor should they be expected to remember the naming convention they used several years ago for a set of experiments they now wish to revisit. Ideally, locating the data you need would be as easy as browsing the web. Unfortunately, existing data management approaches are usually based on hierarchical naming, a 40 year-old technology designed to manage thousands of files, not exabytes of data. Today’s systems do not take advantage of the rich array of metadata that current high-end computing (HEC) file systems can gather, including content-based metadata and provenance1 information. As a result, current metadata search approaches are typically ad hoc and often work by providing a parallel management system to the “main” file system, as is done in Linux (the locate utility), personal computers, and enterprise search

  17. CIF (Crystallographic Information File): A Standard for Crystallographic Data Interchange

    Science.gov (United States)

    Brown, I. D.

    1996-01-01

    The Crystallographic Information File (CIF) uses the self-defining STAR file structure. This requires the creation of a dictionary of data names and definitions. A basic dictionary of terms needed to describe the crystal structures of small molecules was approved in 1991 and is currently used for the submission of papers to Acta Crystallographica C. A number of extensions to this dictionary are in preparation. By storing the dictionary itself as a STAR file, the definitions and relationships in the CIF dictionary become computer interpretable. This offers many possibilities for the automatic handling of crystallographic information. PMID:27805170

  18. The Design of a Secure File Storage System

    Science.gov (United States)

    1979-12-01

    8217brjnw Into the FM process meory to - m - check for proper discretionary access. The complete Dathname, in terms of the FSS file system, - passed to...research shows that a viable approach to the auestion of internal computer security exists. This approach, sometimes termed the "security kernel approach...eration is gninR on, aI significant advantage if the data file is long . kfter theJ file is stored by the 10 process, the FM process gets a ticket to the

  19. Design of Logistics Public Information Platform Based on Cloud Computing Architecture%云计算架构下的物流公共信息平台设计探讨

    Institute of Scientific and Technical Information of China (English)

    李姝宁

    2012-01-01

    为了进一步研究了物流公共信息平台在云计算之下工作的具体特征,本文以云计算技术架构的整体作为起点进行分析,从而构建了物流公共信息平台的云架构并详述了其工作原理,最后通过前文分析展望了物流公共信息平台未来的发展趋势.%In order to further study the specific characteristics of logistics public information platform under the cloud computing, taking the overall cloud computing architecture as a starting point, this paper constructs the clouding architecture of logistics public information platform and describes its working principle, finally looks for the development trend of logistics public information platform in the future.

  20. Value-Based File Retention: File Attributes as File Value and Information Waste Indicators

    NARCIS (Netherlands)

    Wijnhoven, Fons; Amrit, Chintan; Dietz, Pim

    2014-01-01

    Several file retention policy methods propose that a file retention policy should be based on file value. Though such a retention policy might increase the value of accessible files, the method to arrive at such a policy is underresearched. This article discusses how one can arrive at a method for d

  1. DCFPAK: Dose coefficient data file package for Sandia National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Eckerman, K.F.; Leggett, R.W.

    1996-07-31

    The FORTRAN-based computer package DCFPAK (Dose Coefficient File Package) has been developed to provide electronic access to the dose coefficient data files summarized in Federal Guidance Reports 11 and 12. DCFPAK also provides access to standard information regarding decay chains and assembles dose coefficients for all dosimetrically significant radioactive progeny of a specified radionuclide. DCFPAK was designed for application on a PC but, with minor modifications, may be implemented on a UNIX workstation.

  2. Low-Carbon Computing

    Science.gov (United States)

    Hignite, Karla

    2009-01-01

    Green information technology (IT) is grabbing more mainstream headlines--and for good reason. Computing, data processing, and electronic file storage collectively account for a significant and growing share of energy consumption in the business world and on higher education campuses. With greater scrutiny of all activities that contribute to an…

  3. Computer Teaching Reform of Public Security Institutions Based on "Competency-based"%基于“能力本位”的公安院校计算机教学改革初探

    Institute of Scientific and Technical Information of China (English)

    赵薇; 刘振华

    2013-01-01

    近年来,社会的信息化进程加速,计算机在更多的领域发挥了它的重要作用,公安部门也不例外.伴随着公安部门信息化水平的提升,对公安人员的计算机操作水平有了新的要求,只有掌握了较高的计算机技术,才能够胜任信息化条件下的公安工作.同时,也对公安院校的计算机课程的教学提出了新的要求.本文根据现代警务特点和警察职业所需,在计算机教学中引入“能力本位”的教学理念,为培养现代警务急需的计算机应用型人才提供了新思路,创建了新局面.%In recent years, the informatization process of society is accelerating, and the computer has played an important role in more fields, so public security departments are no exception. Accompanied by the improvement of informatization level of public security departments, it has new requirement for the computer operating level of the public security personnel. Only to master the higher computer technology, can the public security personnel do well the work under conditions of informatization. Meanwhile, it proposes new requirement to the computer teaching in police colleges. The paper introduced the "competency—based" teaching philosophy in computer teaching according to the characteristics of modern policing and police occupations requirement, providing a new idea for the training of applied computer talents that the modern police needed, and creating a new situation.

  4. Strategies for Sharing Seismic Data Among Multiple Computer Platforms

    Science.gov (United States)

    Baker, L. M.; Fletcher, J. B.

    2001-12-01

    Seismic waveform data is readily available from a variety of sources, but it often comes in a distinct, instrument-specific data format. For example, data may be from portable seismographs, such as those made by Refraction Technology or Kinemetrics, from permanent seismograph arrays, such as the USGS Parkfield Dense Array, from public data centers, such as the IRIS Data Center, or from personal communication with other researchers through e-mail or ftp. A computer must be selected to import the data - usually whichever is the most suitable for reading the originating format. However, the computer best suited for a specific analysis may not be the same. When copies of the data are then made for analysis, a proliferation of copies of the same data results, in possibly incompatible, computer-specific formats. In addition, if an error is detected and corrected in one copy, or some other change is made, all the other copies must be updated to preserve their validity. Keeping track of what data is available, where it is located, and which copy is authoritative requires an effort that is easy to neglect. We solve this problem by importing waveform data to a shared network file server that is accessible to all our computers on our campus LAN. We use a Network Appliance file server running Sun's Network File System (NFS) software. Using an NFS client software package on each analysis computer, waveform data can then be read by our MatLab or Fortran applications without first copying the data. Since there is a single copy of the waveform data in a single location, the NFS file system hierarchy provides an implicit complete waveform data catalog and the single copy is inherently authoritative. Another part of our solution is to convert the original data into a blocked-binary format (known historically as USGS DR100 or VFBB format) that is interpreted by MatLab or Fortran library routines available on each computer so that the idiosyncrasies of each machine are not visible to

  5. Isothiourea-catalysed enantioselective pyrrolizine synthesis: synthetic and computational studies† †Electronic supplementary information (ESI) available: NMR spectra, HPLC analysis and computational co-ordinates. Data available.12 CCDC 1483759. For ESI and crystallographic data in CIF or other electronic format see DOI: 10.1039/c6ob01557c Click here for additional data file. Click here for additional data file. Click here for additional data file.

    Science.gov (United States)

    Stark, Daniel G.; Williamson, Patrick; Gayner, Emma R.; Musolino, Stefania F.; Kerr, Ryan W. F.; Taylor, James E.; Slawin, Alexandra M. Z.; O'Riordan, Timothy J. C.

    2016-01-01

    The catalytic enantioselective synthesis of a range of cis-pyrrolizine carboxylate derivatives with outstanding stereocontrol (14 examples, >95 : 5 dr, >98 : 2 er) through an isothiourea-catalyzed intramolecular Michael addition-lactonisation and ring-opening approach from the corresponding enone acid is reported. An optimised and straightforward three-step synthetic route to the enone acid starting materials from readily available pyrrole-2-carboxaldehydes is delineated, with benzotetramisole (5 mol%) proving the optimal catalyst for the enantioselective process. Ring-opening of the pyrrolizine dihydropyranone products with either MeOH or a range of amines leads to the desired products in excellent yield and enantioselectivity. Computation has been used to probe the factors leading to high stereocontrol, with the formation of the observed cis-steroisomer predicted to be kinetically and thermodynamically favoured. PMID:27489030

  6. Closed Claim Query File

    Data.gov (United States)

    Social Security Administration — This file is used to hold information about disability claims that have been closed and have been selected for sampling.Sampling is the process whereby OQR reviews...

  7. Provider of Services File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The POS file contains data on characteristics of hospitals and other types of healthcare facilities, including the name and address of the facility and the type of...

  8. Patient Treatment File (PTF)

    Data.gov (United States)

    Department of Veterans Affairs — This database is part of the National Medical Information System (NMIS). The Patient Treatment File (PTF) contains a record for each inpatient care episode provided...

  9. USEEIO Satellite Files

    Data.gov (United States)

    U.S. Environmental Protection Agency — These files contain the environmental data as particular emissions or resources associated with a BEA sectors that are used in the USEEIO model. They are organized...

  10. 76 FR 71267 - Standardized and Enhanced Disclosure Requirements for Television Broadcast Licensee Public...

    Science.gov (United States)

    2011-11-17

    ... active dialogue with broadcast licensees regarding broadcast service. Among other things, the public... greater public access. The INC Report also recommended requiring that when broadcasters allow advertisers... Public Interest Obligations; Extension of the Filing Requirement for Children's Television...

  11. File System Virtual Appliances

    Science.gov (United States)

    2010-05-01

    some of my closest friendships. Ashraf, Ippo and Neil made life much more fun. Mike Merideth introduced me to fine scotch, hi-fi speakers, and piano ...system virtual appliances (4) We analyze the sources of latency in traditional inter-VM communica- tion techniques and present a novel energy- and...tiple file system implementations within the Sun UNIX kernel” [52]. This was achieved through two techniques . First, outside the file system layer

  12. INTERNET: PENGIRIMAN FILE

    Directory of Open Access Journals (Sweden)

    Zainul Bakri

    2012-10-01

    Full Text Available Salah satu alasan pengguna komputer untuk berhubungan dengan Internet adalah mendapat kesempatan untuk menyalin ('download' informasi yang tersimpan dari server jaringan komputer lain (misalnya menyalin program aplikasi komputer, data mentah, dan sebagainya. File Transfer  Protocol (FfP adalah cara di Internet untuk mengirim file dari satu tempat ke komputer pengguna. Untuk keperluan ini dapat menggunakan program FTP khusus atau dengan menggunakan Web browser.

  13. An Approach to Analyze Physical Memory Image File of Mac OS X

    Institute of Scientific and Technical Information of China (English)

    LiJuan Xu; LianHai Wang

    2014-01-01

    Memory analysis is one of the key techniques in computer live forensics. Especially, the analysis of a Mac OS X operating system’ s memory image file plays an important role in identifying the running status of an apple computer. However, how to analyze the image file without using extra”mach-kernel” file is one of the unsolved difficulties. In this paper, we firstly compare several approaches for physical memory acquisition and analyze the effects of each approach on physical memory. Then, we discuss the traditional methods for the physical memory file analysis of Mac OS X. A novel physical memory image file analysis approach without using extra“mach-kernel” file is proposed base on the discussion. We verify the performance of the new approach on Mac OS X 10�8�2. The experimental results show that the proposed approach is simpler and more practical than previous ones.

  14. Cloud object store for checkpoints of high performance computing applications using decoupling middleware

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2016-04-19

    Cloud object storage is enabled for checkpoints of high performance computing applications using a middleware process. A plurality of files, such as checkpoint files, generated by a plurality of processes in a parallel computing system are stored by obtaining said plurality of files from said parallel computing system; converting said plurality of files to objects using a log structured file system middleware process; and providing said objects for storage in a cloud object storage system. The plurality of processes may run, for example, on a plurality of compute nodes. The log structured file system middleware process may be embodied, for example, as a Parallel Log-Structured File System (PLFS). The log structured file system middleware process optionally executes on a burst buffer node.

  15. Cloud object store for archive storage of high performance computing data using decoupling middleware

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2015-06-30

    Cloud object storage is enabled for archived data, such as checkpoints and results, of high performance computing applications using a middleware process. A plurality of archived files, such as checkpoint files and results, generated by a plurality of processes in a parallel computing system are stored by obtaining the plurality of archived files from the parallel computing system; converting the plurality of archived files to objects using a log structured file system middleware process; and providing the objects for storage in a cloud object storage system. The plurality of processes may run, for example, on a plurality of compute nodes. The log structured file system middleware process may be embodied, for example, as a Parallel Log-Structured File System (PLFS). The log structured file system middleware process optionally executes on a burst buffer node.

  16. Cloud object store for archive storage of high performance computing data using decoupling middleware

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2015-06-30

    Cloud object storage is enabled for archived data, such as checkpoints and results, of high performance computing applications using a middleware process. A plurality of archived files, such as checkpoint files and results, generated by a plurality of processes in a parallel computing system are stored by obtaining the plurality of archived files from the parallel computing system; converting the plurality of archived files to objects using a log structured file system middleware process; and providing the objects for storage in a cloud object storage system. The plurality of processes may run, for example, on a plurality of compute nodes. The log structured file system middleware process may be embodied, for example, as a Parallel Log-Structured File System (PLFS). The log structured file system middleware process optionally executes on a burst buffer node.

  17. LASIP-III, a generalized processor for standard interface files. [For creating binary files from BCD input data and printing binary file data in BCD format (devised for fast reactor physics codes)

    Energy Technology Data Exchange (ETDEWEB)

    Bosler, G.E.; O' Dell, R.D.; Resnik, W.M.

    1976-03-01

    The LASIP-III code was developed for processing Version III standard interface data files which have been specified by the Committee on Computer Code Coordination. This processor performs two distinct tasks, namely, transforming free-field format, BCD data into well-defined binary files and providing for printing and punching data in the binary files. While LASIP-III is exported as a complete free-standing code package, techniques are described for easily separating the processor into two modules, viz., one for creating the binary files and one for printing the files. The two modules can be separated into free-standing codes or they can be incorporated into other codes. Also, the LASIP-III code can be easily expanded for processing additional files, and procedures are described for such an expansion. 2 figures, 8 tables.

  18. Students "Hacking" School Computer Systems

    Science.gov (United States)

    Stover, Del

    2005-01-01

    This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…

  19. Students "Hacking" School Computer Systems

    Science.gov (United States)

    Stover, Del

    2005-01-01

    This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…

  20. 77 FR 59978 - Notice of Receipt of Complaint; Solicitation of Comments Relating to the Public Interest

    Science.gov (United States)

    2012-10-01

    ... COMMISSION Notice of Receipt of Complaint; Solicitation of Comments Relating to the Public Interest AGENCY: U... on any public interest issues raised by the complaint or complainant's filing under section 210.8(b.... Proposed respondents, other interested parties, and members of the public are invited to file comments,...

  1. 78 FR 76655 - Notice of Receipt of Complaint; Solicitation of Comments Relating to the Public Interest

    Science.gov (United States)

    2013-12-18

    ... COMMISSION Notice of Receipt of Complaint; Solicitation of Comments Relating to the Public Interest AGENCY: U... comments on any public interest issues raised by the complaint or complainant's filing under section 210.8... interested parties, and members of the public are invited to file comments, not to exceed five (5) pages...

  2. 75 FR 29601 - Office of the Secretary: Notice of Applications for Certificates of Public Convenience and...

    Science.gov (United States)

    2010-05-26

    ... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B... Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B...

  3. 78 FR 63273 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2013-10-23

    ... Office of the Secretary Notice of Applications for Certificates of Public Convenience and Necessity and... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B... of Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart...

  4. 76 FR 68256 - Notice of Applications for Certificates of Public Convenience and Necessity and Foreign Air...

    Science.gov (United States)

    2011-11-03

    ... for Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B... Corporation (``JetBlue'') requesting a certificate of public convenience and necessity and requests...

  5. 75 FR 53999 - Office of the Secretary: Notice of Applications for Certificates of Public Convenience and...

    Science.gov (United States)

    2010-09-02

    ... Office of the Secretary: Notice of Applications for Certificates of Public Convenience and Necessity and... Certificates of Public Convenience and Necessity and Foreign Air Carrier Permits Filed Under Subpart B... Public Convenience and Necessity and Foreign Air Carrier Permits were filed under Subpart B...

  6. Computer Vision Syndrome.

    Science.gov (United States)

    Randolph, Susan A

    2017-07-01

    With the increased use of electronic devices with visual displays, computer vision syndrome is becoming a major public health issue. Improving the visual status of workers using computers results in greater productivity in the workplace and improved visual comfort.

  7. DSSTOX MASTER STRUCTURE-INDEX FILE: SDF FILE AND DOCUMENTATION

    Science.gov (United States)

    The DSSTox Master Structure-Index File serves to consolidate, manage, and ensure quality and uniformity of the chemical and substance information spanning all DSSTox Structure Data Files, including those in development but not yet published separately on this website.

  8. A Centralized Control and Dynamic Dispatch Architecture for File Integrity Analysis

    Directory of Open Access Journals (Sweden)

    Ronald DeMara

    2006-02-01

    Full Text Available The ability to monitor computer file systems for unauthorized changes is a powerful administrative tool. Ideally this task could be performed remotely under the direction of the administrator to allow on-demand checking, and use of tailorable reporting and exception policies targeted to adjustable groups of network elements. This paper introduces M-FICA, a Mobile File Integrity and Consistency Analyzer as a prototype to achieve this capability using mobile agents. The M-FICA file tampering detection approach uses MD5 message digests to identify file changes. Two agent types, Initiator and Examiner, are used to perform file integrity tasks. An Initiator travels to client systems, computes a file digest, then stores those digests in a database file located on write-once media. An Examiner agent computes a new digest to compare with the original digests in the database file. Changes in digest values indicate that the file contents have been modified. The design and evaluation results for a prototype developed in the Concordia agent framework are described.

  9. DSSTOX MASTER STRUCTURE-INDEX FILE: SDF FILE AND ...

    Science.gov (United States)

    The DSSTox Master Structure-Index File serves to consolidate, manage, and ensure quality and uniformity of the chemical and substance information spanning all DSSTox Structure Data Files, including those in development but not yet published separately on this website. The DSSTox Master Structure-Index File serves to consolidate, manage, and ensure quality and uniformity of the chemical and substance information spanning all DSSTox Structure Data Files, including those in development but not yet published separately on this website.

  10. 76 FR 77551 - Notice of Filing of Plats of Survey, New Mexico

    Science.gov (United States)

    2011-12-13

    ... Bureau of Land Management Notice of Filing of Plats of Survey, New Mexico AGENCY: Bureau of Land... below are scheduled to be officially filed in the New Mexico State Office, Bureau of Land Management, Santa Fe, New Mexico, thirty (30) calendar days from the date of this publication....

  11. 78 FR 64974 - Notice of Filing of Plats of Survey, New Mexico

    Science.gov (United States)

    2013-10-30

    ... Bureau of Land Management Notice of Filing of Plats of Survey, New Mexico AGENCY: Bureau of Land... below are scheduled to be officially filed in the New Mexico State Office, Bureau of Land Management, Santa Fe, New Mexico, thirty (30) calendar days from the date of this publication. FOR FURTHER...

  12. 77 FR 17092 - Notice of Filing of Plats of Survey, New Mexico

    Science.gov (United States)

    2012-03-23

    ... Bureau of Land Management Notice of Filing of Plats of Survey, New Mexico AGENCY: Bureau of Land... below are scheduled to be officially filed in the New Mexico State Office, Bureau of Land Management, Santa Fe, New Mexico, thirty (30) calendar days from the date of this publication....

  13. 75 FR 17432 - Notice of Filing of Plats of Survey, New Mexico

    Science.gov (United States)

    2010-04-06

    ... Bureau of Land Management Notice of Filing of Plats of Survey, New Mexico AGENCY: Bureau of Land... below are scheduled to be officially filed in the New Mexico State Office, Bureau of Land Management (BLM), Santa Fe, New Mexico, thirty (30) calendar days from the date of this publication....

  14. 78 FR 17259 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Science.gov (United States)

    2013-03-20

    ...'') and Amazon.com Inc. (``AMZN''). The Exchange notes that any expansion of the program would require....com/filter/wotitle/rule_filing , at MIAX's principal office, and at the Commission's Public Reference... (September 28, 2012), 77 FR 60735 (October 4, 2012) (Notice of Filing of Amendments No. 1 and Order...

  15. 42 CFR 423.2108 - MAC Actions when request for review is filed.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 3 2010-10-01 2010-10-01 false MAC Actions when request for review is filed. 423... Hearings, MAC review, and Judicial Review § 423.2108 MAC Actions when request for review is filed. (a) General. Except as specified in paragraph (c) of this section, when an enrollee requests that the MAC...

  16. 76 FR 57799 - Agency Information Collection Activities; Proposal That Electronic Filing of Bank Secrecy Act...

    Science.gov (United States)

    2011-09-16

    ... using the free FinCEN BSA E-Filing system will provide a range of benefits. Electronic filing will also...) in making the producer-licensing process more cost-effective, streamlined and uniform for the benefit.... Information in trade journals and other publications, along with informal comments from the Internal...

  17. 36 CFR 902.57 - Investigatory files compiled for law enforcement purposes.

    Science.gov (United States)

    2010-07-01

    ... for law enforcement purposes. 902.57 Section 902.57 Parks, Forests, and Public Property PENNSYLVANIA... Records § 902.57 Investigatory files compiled for law enforcement purposes. (a) Files compiled by the Corporation for law enforcement purposes, including the enforcement of the regulations of the Corporation, are...

  18. Challenges of Hidden Data in the Unused Area Two within Executable Files

    Directory of Open Access Journals (Sweden)

    A. W. Naji

    2009-01-01

    Full Text Available Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers, and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. There are many challenges of hidden data in the unused area two within executable files, which is dependencies of the size of the cover file with the size of hidden information, differences of the size of file before and after the hiding process, availability of the cover file after the hiding process to perform normally and detection by antivirus software as a result of changes made to the file. Approach: The system designed to accommodate the release mechanism that consists of two functions; first is the hiding of the information in the unused area 2 of PE-file (exe.file, through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information. Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file with in unused area 2 of any execution file (exe.file. Conclusion: Features of the short-term responses were simulated that the size of the hidden data does depend on the size of the unused area2 within cover file which is equal 20% from the size of exe.file before hiding process, most antivirus systems do not allow direct write in executable file, so the approach of the proposed system is to prevent the hidden information to observation of these systems and the exe.file still function as usual after the hiding process.

  19. M-FILE FOR MIX DESIGN OF STRUCTURAL LIGHTWEIGHT CONCRETE USING DEVELOPED MODELS

    Directory of Open Access Journals (Sweden)

    M. ABDULLAHI

    2011-08-01

    Full Text Available An m-file for mix design of structural lightweight concrete is presented. Mix design of structural lightweight concrete is conducted using guide in the standards. This may be tasking involving reading and understanding of the relevant standards. This renders the process inefficient and liable to errors in computations. A computer approach to mix design will alleviate this problem. An m-file was developed in MATLAB environment for the concrete mix design. The m-file has been tested and has proved to be efficient in computing the mix composition for the first trial batch of lightweight concrete mixes. It can also perform concrete mixture proportioning adjustment.

  20. Efficient compression of molecular dynamics trajectory files.

    Science.gov (United States)

    Marais, Patrick; Kenwood, Julian; Smith, Keegan Carruthers; Kuttel, Michelle M; Gain, James

    2012-10-15

    We investigate whether specific properties of molecular dynamics trajectory files can be exploited to achieve effective file compression. We explore two classes of lossy, quantized compression scheme: "interframe" predictors, which exploit temporal coherence between successive frames in a simulation, and more complex "intraframe" schemes, which compress each frame independently. Our interframe predictors are fast, memory-efficient and well suited to on-the-fly compression of massive simulation data sets, and significantly outperform the benchmark BZip2 application. Our schemes are configurable: atomic positional accuracy can be sacrificed to achieve greater compression. For high fidelity compression, our linear interframe predictor gives the best results at very little computational cost: at moderate levels of approximation (12-bit quantization, maximum error ≈ 10(-2) Å), we can compress a 1-2 fs trajectory file to 5-8% of its original size. For 200 fs time steps-typically used in fine grained water diffusion experiments-we can compress files to ~25% of their input size, still substantially better than BZip2. While compression performance degrades with high levels of quantization, the simulation error is typically much greater than the associated approximation error in such cases.

  1. Measurements of file transfer rates over dedicated long-haul connections

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S [ORNL; Settlemyer, Bradley W [ORNL; Imam, Neena [ORNL; Hinkel, Gregory Carl [ORNL

    2016-01-01

    Wide-area file transfers are an integral part of several High-Performance Computing (HPC) scenarios. Dedicated network connections with high capacity, low loss rate and low competing traffic, are increasingly being provisioned over current HPC infrastructures to support such transfers. To gain insights into these file transfers, we collected transfer rate measurements for Lustre and xfs file systems between dedicated multi-core servers over emulated 10 Gbps connections with round trip times (rtt) in 0-366 ms range. Memory transfer throughput over these connections is measured using iperf, and file IO throughput on host systems is measured using xddprof. We consider two file system configurations: Lustre over IB network and xfs over SSD connected to PCI bus. Files are transferred using xdd across these connections, and the transfer rates are measured, which indicate the need to jointly optimize the connection and host file IO parameters to achieve peak transfer rates. In particular, these measurements indicate that (i) peak file transfer rate is lower than peak connection and host IO throughput, in some cases by as much as 50% or lower, (ii) xdd request sizes that achieve peak throughput for host file IO do not necessarily lead to peak file transfer rates, and (iii) parallelism in host IO and TCP transport does not always improve the file transfer rates.

  2. Cloud Based Log file analysis with Interactive Spark as a Service

    Directory of Open Access Journals (Sweden)

    Nurudeen Sherif

    2016-07-01

    Full Text Available The Software applications are usually programmed to generate some auxiliary text files referred to as log files. Such files are used throughout various stages of the software development, primarily for debugging and identification of errors. Use of log files makes debugging easier during testing. It permits following the logic of the program, at high level, while not having to run it in debug mode. Nowadays, log files are usually used at commercial software installations for the aim of permanent software observation and finetuning. Log files became a typical part of software application and are essential in operating systems, networks and distributed systems. Log files are usually the only way to determine and find errors in a software application, because probe effect has no effect on log file analysis. Log files are usually massive and may have an intricate structure. Though the method of generating log files is sort of easy and simple, log file analysis may well be an incredible task that needs immense computing resources and complex procedures.

  3. Public Education, Public Good.

    Science.gov (United States)

    Tomlinson, John

    1986-01-01

    Criticizes policies which would damage or destroy a public education system. Examines the relationship between government-provided education and democracy. Concludes that privatization of public education would emphasize self-interest and selfishness, further jeopardizing the altruism and civic mindedness necessary for the public good. (JDH)

  4. 77 FR 16224 - Billion Auto, Inc.; Analysis of Proposed Consent Order To Aid Public Comment

    Science.gov (United States)

    2012-03-20

    ... Billion Auto, Inc.; Analysis of Proposed Consent Order To Aid Public Comment AGENCY: Federal Trade... SUPPLEMENTARY INFORMATION section below. Write ``Billion Auto, File No. 112 3209'' on your comment, and file... comment, we must receive it on or before April 16, 2012. Write ``Billion Auto, File No. 112 3209'' on your...

  5. Translator program converts computer printout into braille language

    Science.gov (United States)

    Powell, R. A.

    1967-01-01

    Computer program converts print image tape files into six dot Braille cells, enabling a blind computer programmer to monitor and evaluate data generated by his own programs. The Braille output is printed 8 lines per inch.

  6. Building Hot Snapshot Copy Based on Windows File System

    Institute of Scientific and Technical Information of China (English)

    WANG Lina; GUO Chi; WANG Dejun; ZHU Qin

    2006-01-01

    This paper describes a method for building hot snapshot copy based on windows-file system (HSCF). The architecture and running mechanism of HSCF are discussed after giving a comparison with other on-line backup technology. HSCF, based on a file system filter driver, protects computer data and ensures their integrity and consistency with following three steps:access to open files, synchronization and copy-on-write. Its strategies for improving system performance are analyzed including priority setting, incremental snapshot and load balance. HSCF is a new kind of snapshot technology to solve the data integrity and consistency problem in online backup, which is different from other storage-level snapshot and Open File Solution.

  7. Product identification file

    Energy Technology Data Exchange (ETDEWEB)

    Gray, C.E. (ed.)

    1978-06-01

    This product identification file was compiled as an aid to the industrial hygienist who may encounter the products listed in surveys for and studies of occupational health hazards. It is pointed out that the chemical composition of a product may vary from year to year and some components may be added or deleted without an indication on the label. Some of the data in this file may not be complete depending on the analysis requested. For example, a solvent may be the only component for which the product was analyzed. The file is arranged by listing the chemical manufacturer, followed by the trade name. In cases where no manufacturer is known, the trade name appears in alphabetical order. The log number and the chemist who analyzed the product are listed for reference.

  8. Formalizing a Hierarchical File System

    NARCIS (Netherlands)

    Hesselink, Wim H.; Lali, M.I.

    2009-01-01

    In this note, we define an abstract file system as a partial function from (absolute) paths to data. Such a file system determines the set of valid paths. It allows the file system to be read and written at a valid path, and it allows the system to be modified by the Unix operations for removal (rm)

  9. Formalizing a hierarchical file system

    NARCIS (Netherlands)

    Hesselink, Wim H.; Lali, Muhammad Ikram

    2012-01-01

    An abstract file system is defined here as a partial function from (absolute) paths to data. Such a file system determines the set of valid paths. It allows the file system to be read and written at a valid path, and it allows the system to be modified by the Unix operations for creation, removal, a

  10. Research of public security platform cloud computing architecture based on internet of things%基于物联网的公共安全云计算平台

    Institute of Scientific and Technical Information of China (English)

    白蛟; 全春来; 郭镇

    2011-01-01

    Internet of things is introduced into the field of public safety technology, and the applications of the distributed computing, virtualized storage and cloud computing technology are discussed. To overcome the disadvantages of the existing public security platform, Internet of things five layers the public safety platform architecture is designed, and all levels of features and technology application are described, which provides a new way for the future construction of Internet of things for police. In order to achieve the business data sharing and security, based on this architecture the data supporting platform is proposed based on cloud computing, which supports vir-tualization of data storage and management, and meanwhile offers high performance computing power and storage equipment dynamic expansion ability. Security and computing power of Internet of things are improved.%将物联网技术引入到公共安全领域,重点研究了分布式计算和虚拟化存储及云计算的技术特点和应用,针对目前公共安全平台的不足,设计了5层的物联网公共安全平台架构,为以后警用物联网的建设提供了新的思路,同时结合该架构,提出了一种基于云计算的数据支撑平台,为该公共安全平台提供虚拟化的数据存储和管理,以实现各业务数据的共享和安全,提高了物联网应用的安全和计算能力.

  11. Analytics Platform for ATLAS Computing Services

    CERN Document Server

    Vukotic, Ilija; The ATLAS collaboration; Bryant, Lincoln

    2016-01-01

    Big Data technologies have proven to be very useful for storage, processing and visualization of derived metrics associated with ATLAS distributed computing (ADC) services. Log file data and database records, and metadata from a diversity of systems have been aggregated and indexed to create an analytics platform for ATLAS ADC operations analysis. Dashboards, wide area data access cost metrics, user analysis patterns, and resource utilization efficiency charts are produced flexibly through queries against a powerful analytics cluster. Here we explore whether these techniques and analytics ecosystem can be applied to add new modes of open, quick, and pervasive access to ATLAS event data so as to simplify access and broaden the reach of ATLAS public data to new communities of users. An ability to efficiently store, filter, search and deliver ATLAS data at the event and/or sub-event level in a widely supported format would enable or significantly simplify usage of machine learning tools like Spark, Jupyter, R, S...

  12. Computational Chemistry Data Management Platform Based on the Semantic Web.

    Science.gov (United States)

    Wang, Bing; Dobosh, Paul A; Chalk, Stuart; Sopek, Mirek; Ostlund, Neil S

    2017-01-12

    This paper presents a formal data publishing platform for computational chemistry using semantic web technologies. This platform encapsulates computational chemistry data from a variety of packages in an Extensible Markup Language (XML) file called CSX (Common Standard for eXchange). On the basis of a Gainesville Core (GC) ontology for computational chemistry, a CSX XML file is converted into the JavaScript Object Notation for Linked Data (JSON-LD) format using an XML Stylesheet Language Transformation (XSLT) file. Ultimately the JSON-LD file is converted to subject-predicate-object triples in a Turtle (TTL) file and published on the web portal. By leveraging semantic web technologies, we are able to place computational chemistry data onto web portals as a component of a Giant Global Graph (GGG) such that computer agents, as well as individual chemists, can access the data.

  13. JavaFIRE: A Replica and File System for Grids

    Science.gov (United States)

    Petek, Marko; da Silva Gomes, Diego; Resin Geyer, Claudio Fernando; Santoro, Alberto; Gowdy, Stephen

    2012-12-01

    The work is focused on the creation of a replica and file transfers system for Computational Grids inspired on the needs of the High Energy Physics (HEP). Due to the high volume of data created by the HEP experiments, an efficient file and dataset replica system may play an important role on the computing model. Data replica systems allow the creation of copies, distributed between the different storage elements on the Grid. In the HEP context, the data files are basically immutable. This eases the task of the replica system, because given sufficient local storage resources any dataset just needs to be replicated to a particular site once. Concurrent with the advent of computational Grids, another important theme in the distributed systems area that has also seen some significant interest is that of peer-to-peer networks (p2p). P2p networks are an important and evolving mechanism that eases the use of distributed computing and storage resources by end users. One common technique to achieve faster file download from possibly overloaded storage elements over congested networks is to split the files into smaller pieces. This way, each piece can be transferred from a different replica, in parallel or not, optimizing the moments when the network conditions are better suited to the transfer. The main tasks achieved by the system are: the creation of replicas, the development of a system for replicas transfer (RFT) and for replicas location (RLS) with a different architecture that the one provided by Globus and the development of a system for file transfer in pieces on computational grids with interfaces for several storage elements. The RLS uses a p2p overlay based on the Kademlia algorithm.

  14. CMAQv5.1 Base NEIv1 AQS hourly site compare files

    Data.gov (United States)

    U.S. Environmental Protection Agency — CMAQv5.1 Base NEIv1 AQS hourly sitex files containing hourly paired model/ob data for the AQS network. This dataset is associated with the following publication:...

  15. INSPIRE and SPIRES Log File Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Adams, Cole; /Wheaton Coll. /SLAC

    2012-08-31

    SPIRES, an aging high-energy physics publication data base, is in the process of being replaced by INSPIRE. In order to ease the transition from SPIRES to INSPIRE it is important to understand user behavior and the drivers for adoption. The goal of this project was to address some questions in regards to the presumed two-thirds of the users still using SPIRES. These questions are answered through analysis of the log files from both websites. A series of scripts were developed to collect and interpret the data contained in the log files. The common search patterns and usage comparisons are made between INSPIRE and SPIRES, and a method for detecting user frustration is presented. The analysis reveals a more even split than originally thought as well as the expected trend of user transition to INSPIRE.

  16. 78 FR 17394 - Filing via the Internet; Electronic Tariff Filings; Revisions to Electric Quarterly Report Filing...

    Science.gov (United States)

    2013-03-21

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Filing via the Internet; Electronic Tariff Filings; Revisions to Electric Quarterly Report Filing Process; Notice of Technical Conference Take notice that on April 16, 2013,...

  17. 11 CFR 100.19 - File, filed or filing (2 U.S.C. 434(a)).

    Science.gov (United States)

    2010-01-01

    ... a facsimile machine or by electronic mail if the reporting entity is not required to file..., including electronic reporting entities, may use the Commission's website's on-line program to file 48-hour... the reporting entity is not required to file electronically in accordance with 11 CFR 104.18....

  18. 微课在高校计算机公共课Blending Learning中的应用研究%Micro-Lecture Practicing Research in University Computer Public Course Blending Learning

    Institute of Scientific and Technical Information of China (English)

    陈静; 胡玉娟

    2016-01-01

    本文研究微课在高校计算机公共课 Blending Learning中的应用方法和效果,首先分析Blending Learning 和微课在高校计算机公共课中的特点,然后总结高校计算机公共课Blending Learning中微课的设计和应用方法。基于认知负荷理论设计了“微课学习任务单”并且结合动机模型( ARCS)设计了调查问卷,采用行动研究的方法初步在教学班级实践了3种类型微课的应用。实践调查分析了微课在高校计算机公共课Blending Learning中的学习效果,总结了学生对于微课类型和运用的教学环节的偏向,为在高校计算机公共课中使用微课提供了一定的参考,也为进一步研究提供基础。%This paper aims to study the application method and effect of micro class in the Blending Learning of computer public course in university.First, we analyze the characteristics of blending learning and the micro-lecture in the university com-puter public course,then summarize the teaching model of university computer public course blending learning based on micro-lec-ture.We design Micro-lecture task list based on the cognitive load theory and questionnaire based on the John model of the Keller ARCS and apply it into the three types of micro-lecture in teaching classes.Through the practice investigation and analysis of the learning effect of the learning blending of the university computer public course based on the micro-lecture, we summarize the devi-ation of students in the teaching process , which can provide a reference for the use of micro-lecture in the university computer pub-lic course, and provide the basis for further research.

  19. 40 CFR 85.1807 - Public hearings.

    Science.gov (United States)

    2010-07-01

    ...) CONTROL OF AIR POLLUTION FROM MOBILE SOURCES Recall Regulations § 85.1807 Public hearings. (a) Definitions... Clerk and shall be made available to the public during Agency business hours. (c) Filing and service. (1..., Sunday, or Federal legal holiday, such period shall be extended to include the next following...

  20. A History of the Andrew File System

    CERN Document Server

    CERN. Geneva; Altman, Jeffrey

    2011-01-01

    Derrick Brashear and Jeffrey Altman will present a technical history of the evolution of Andrew File System starting with the early days of the Andrew Project at Carnegie Mellon through the commercialization by Transarc Corporation and IBM and a decade of OpenAFS. The talk will be technical with a focus on the various decisions and implementation trade-offs that were made over the course of AFS versions 1 through 4, the development of the Distributed Computing Environment Distributed File System (DCE DFS), and the course of the OpenAFS development community. The speakers will also discuss the various AFS branches developed at the University of Michigan, Massachusetts Institute of Technology and Carnegie Mellon University.

  1. FORMATION OF A COMPUTER SECURITY POLICY BOARD

    CERN Multimedia

    2001-01-01

    In view of the increasing number of security incidents at CERN, the Directorate has set up a Computer Security Policy Board. Information about the mandate and the meetings of the Board is linked from http://cern.ch/security which is the entry point for computer security information at CERN. File Services Computing Rule The use of CERN's Computing facilities are governed by Operational Circular No 5 and its subsidiary rules. To protect file servers at CERN from unauthorised use, the Organization has issued a new subsidiary rule related to file services. Details hereof and of the complete set of rules applicable to the use of CERN computing facilities are available at http://cern.ch/ComputingRules

  2. FORMATION OF A COMPUTER SECURITY POLICY BOARD

    CERN Multimedia

    2001-01-01

    In view of the increasing number of security incidents at CERN, the Directorate has set up a Computer Security Policy Board. Information about the mandate and the meetings of the Board is linked from http://cern.ch/security, which is the entry point for computer security information at CERN. FILE SERVICES COMPUTING RULE The use of CERN's Computing facilities are governed by Operational Circular No 5 and its subsidiary rules. To protect file servers at CERN from unauthorised use, the Organization has issued a new subsidiary rule related to file services. Details hereof and of the complete set of rules applicable to the use of CERN computing facilities are available at http://cern.ch/ComputingRules.

  3. Blog: A new Platform for Making Government File Information Resource Public%微博:政府档案信息资源公开的新平台——基于政务微博的价值分析

    Institute of Scientific and Technical Information of China (English)

    房洁; 李许燕

    2012-01-01

    Blog, as the new member of "the fifth media", shows three natures such as media, social communication, and platform. It also shows the feature, opening for two-way communication. Thus blog has the advantages in terms of making information public and spreading information. That the governments open blog and make it a new channel can bring much value in terms of economy, politics, society, and micro-environment, etc. Therefore, it is feasible for us to choose blog as the platform to make government file information resource public.%微博作为“第五媒体”的新成员,拥有媒体、社交、平台三大属性和双向开放的基因,在信息公开和传播方面具有独特优势。政府开通微博并将其作为信息公开的一个新渠道,具有经济、政治、社会和微环境等多方面的价值。政府档案信息资源选择微博作为公开信息的平台具有可行性。

  4. Computer jargon explained

    CERN Document Server

    Enticknap, Nicholas

    2014-01-01

    Computer Jargon Explained is a feature in Computer Weekly publications that discusses 68 of the most commonly used technical computing terms. The book explains what the terms mean and why the terms are important to computer professionals. The text also discusses how the terms relate to the trends and developments that are driving the information technology industry. Computer jargon irritates non-computer people and in turn causes problems for computer people. The technology and the industry are changing so rapidly; it is very hard even for professionals to keep updated. Computer people do not

  5. Download this PDF file

    African Journals Online (AJOL)

    Buchi

    Method: The case files of the 225 maternal deaths which occurred between ... cause related to or aggravated by the pregnancy or its ... Multiple factors have been suggested for this fall ..... responsible for only 2, (0.9%) of deaths. In other.

  6. Download this PDF file

    African Journals Online (AJOL)

    User

    MARC (machine-readable catalogue) format. The records are ... software in the library, while in Web OPAC,. HTML files are used ... training in other fields of applied learning that is relevant to the ..... the Libraries of Engineering. Colleges in ...

  7. Download this PDF file

    African Journals Online (AJOL)

    Fr. Ikenga

    Nigeria; and the gains and challenges of utilizing e-taxation in tax ... teething problems usually encountered in all new schemes. ... is to help tax authorities reduce and possibly eliminate tax evasion. .... issues that include how to use the tax authorities' electronic tax filing system and ..... financial institution for Direct Deposit.

  8. The New Resource File

    Science.gov (United States)

    Luck, Donald D.

    2011-01-01

    The development of the resource file is a common experience in teacher preparation programs. The author examines strategies for transforming what has been a project composed of physical resources to one emphasizing digital resources. Methods for finding, tagging, storing and retrieving resources are explored.

  9. Assessing the economic impact of public investment in Malaysia: a case study on MyRapid Transit project using a dynamic computable general equilibrium model

    OpenAIRE

    Muniandy, Meenachi

    2017-01-01

    The central focus of this thesis is the question of whether public investment in transport infrastructure contributes positively to Malaysia’s economic growth and welfare. Although there are strong analytical reasons to believe that public investment spending is one of the important variables that influence growth, there remains significant uncertainty about its actual degree of influence. In Malaysia, whenever there is a collapse in domestic demand, government spending becomes an important m...

  10. Flash在计算机中的设计与实现%Design and Implementation of Flash Public Service Ads in Computer

    Institute of Scientific and Technical Information of China (English)

    史耀进

    2012-01-01

    本文将广告理论与Flash广告相结合,介绍了Flash公益广告的设计与实现,并通过实例分析了Flash公益广告的特色.%This paper introduced the design and implementation of Flash public service advertising combined with the Flash ads and theory of the traditional advertising, and analyzed the characteristics of Flash public service advertising through the case.

  11. Public Speech.

    Science.gov (United States)

    Green, Thomas F.

    1994-01-01

    Discusses the importance of public speech in society, noting the power of public speech to create a world and a public. The paper offers a theory of public speech, identifies types of public speech, and types of public speech fallacies. Two ways of speaking of the public and of public life are distinguished. (SM)

  12. FROM CAD MODEL TO 3D PRINT VIA “STL” FILE FORMAT

    National Research Council Canada - National Science Library

    Cătălin IANCU; Daniela IANCU; Alin STĂNCIOIU

    2010-01-01

    The paper work presents the STL file format, which is now used for transferring information from CAD software to a 3D printer, for obtaining the solid model in Rapid prototyping and Computer Aided Manufacturing...

  13. Public Infrastructure for Monte Carlo Simulation: publicMC@BATAN

    CERN Document Server

    Waskita, A A; Akbar, Z; Handoko, L T; 10.1063/1.3462759

    2010-01-01

    The first cluster-based public computing for Monte Carlo simulation in Indonesia is introduced. The system has been developed to enable public to perform Monte Carlo simulation on a parallel computer through an integrated and user friendly dynamic web interface. The beta version, so called publicMC@BATAN, has been released and implemented for internal users at the National Nuclear Energy Agency (BATAN). In this paper the concept and architecture of publicMC@BATAN are presented.

  14. Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android

    Directory of Open Access Journals (Sweden)

    Siswo Wardoyo

    2016-03-01

    Full Text Available Cryptography is one of the ways used to secure data in the form of a file with encrypt files so that others are not entitled to know the file is private and confidential. One method is the algorithm Blowfish Cryptography which is a symmetric key using the algorithm to perform encryption and decryption. Applications that are built can perform file encryption-shaped images, videos, and documents. These applications can be running on a mobile phone that has a minimal operating system Android version 2.3. The software used to build these applications is Eclipse. The results of this research indicate that applications built capable of performing encryption and decryption. The results file encryption makes files into another unknown meaning. By using the keys numbered 72 bits or 9 character takes 1,49x108 years to break it with the speed it’s computation is 106 key/sec.

  15. U.S. Department of Energy Best Practices Workshop onFile Systems & Archives San Francisco, CA September 26-27, 2011 Position Paper

    Energy Technology Data Exchange (ETDEWEB)

    Hedges, R M

    2011-09-01

    This position paper discusses issues of usability of the large parallel file systems in the Livermore Computing Center. The primary uses of these file systems are for storage and access of data that is created during the course of a simulation running on an LC system. The Livermore Computing Center has multiple, globally mounted parallel file systems in each of its computing environments. The single biggest issue of file system usability that we have encountered through the years is to maintain continuous file system responsiveness. Given the back end storage hardware that our file systems are provisioned with, it is easily possible for a particularly I/O intensive application or one with particularly inefficiently coded I/O operations to bring the file system to an apparent halt. The practice that we will be addressing is one of having an ability to indentify, diagnose, analyze and optimize the I/O quickly and effectively.

  16. 基于云计算的电子政务公共平台建设研究%Research on the Building of Electronic Government Public Platform Based on the Cloud Computing

    Institute of Scientific and Technical Information of China (English)

    吕小刚

    2016-01-01

    伴随着我国进入智慧政府建设阶段,政府信息化建设模式也从政府主导转向满足公众需求为核心点的需求导向、问题导向的全新模式。新形势下政府云平台的建设更好地整合硬件和服务资源,并实现资源的高效调度与公众需求最大化契合。文章通过对云计算相关概念的阐述,以“创新、协调、绿色、开放、共享”理念为基础,剖析出基于云计算的电子政务公共平台建设的意义,探索基于云计算电子政务公共平台建设的对策。%With our government developing into intelligent government, the information construction mode of government has transformed from government-led to a new mode that must be need for the public. Under the new situation government cloud platform construction is integrating the hardware resources and software resources together better, and dispatching all kinds of resources for the need of public. By stating the conception of the cloud computing, based on the ethos of“innovation, co-ordination, environment, opening, sharing”, the paper analyzes the meaning of the building of electronic government public platform based on the cloud computing and explores the strategy of building of electronic government public platform based on the cloud computing.

  17. The digital computer

    CERN Document Server

    Parton, K C

    2014-01-01

    The Digital Computer focuses on the principles, methodologies, and applications of the digital computer. The publication takes a look at the basic concepts involved in using a digital computer, simple autocode examples, and examples of working advanced design programs. Discussions focus on transformer design synthesis program, machine design analysis program, solution of standard quadratic equations, harmonic analysis, elementary wage calculation, and scientific calculations. The manuscript then examines commercial and automatic programming, how computers work, and the components of a computer

  18. 75 FR 28239 - Marine Mammals; File No. 15537

    Science.gov (United States)

    2010-05-20

    ... marine mammal public display facility in the states of Mississippi and Alabama. The receiving facility... National Oceanic and Atmospheric Administration RIN 0648-XW51 Marine Mammals; File No. 15537 AGENCY.... ACTION: Notice; receipt of application. SUMMARY: Notice is hereby given that Institute for Marine...

  19. 34 CFR 300.507 - Filing a due process complaint.

    Science.gov (United States)

    2010-07-01

    ... parents. The public agency must inform the parent of any free or low-cost legal and other relevant... 34 Education 2 2010-07-01 2010-07-01 false Filing a due process complaint. 300.507 Section 300.507 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF SPECIAL EDUCATION...

  20. 76 FR 19976 - Marine Mammals; File No. 15537

    Science.gov (United States)

    2011-04-11

    ... National Oceanic and Atmospheric Administration RIN 0648- XA352 Marine Mammals; File No. 15537 AGENCY... public display permit application received from the Institute for Marine Mammal Studies (IMMS), P.O. Box... permit was received by the above-named applicant under the authority of the Marine Mammal Protection Act...

  1. 75 FR 12535 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-03-16

    .... Description: Midwest Independent Transmission System Operator, Inc submits Sub Second Sheet No. 800 et al. to.... submits the tariff sheets as Exhibits A (red-lines) and B (clean) with revised tariff number and sheet... update the cost-based rate schedule of Arizona Public Service Company. Filed Date: 03/04/2010. Accession...

  2. RAFFS: Model Checking a Robust Abstract Flash File Store

    NARCIS (Netherlands)

    Taverne, P.; Pronk, C.

    2009-01-01

    Accepted for publication in the Proceedings of the 11th International Conference on Formal Engineering Methods, ICFEM 2009. This paper presents a case study in modeling and verifying a POSIX-like file store for Flash memory. This work fits in the context of Hoare’s verification challenge and, in pa

  3. Evaluating File Formats for Long-term Preservation

    Institute of Scientific and Technical Information of China (English)

    JUDITH ROG; CAROLINE VAN WIJK

    2008-01-01

    National and international publishers have been depositing digital publications at the National Library of the Netherlands(KB)since 2003.Until recently,most of these publications were deposited in the Portable Document Format.New projects,for example the Web archiving project,force the KB to handle more heterogeneous material.Therefore,the KB has developed a quantifiable file format risk assessment method.This method can be used to define digital preservation strategies for specific file formats.The choice for a specific file format at creation time or later in the life cycle of a digital object influences the long-term access to the digital object.The evaluation method contains seven sustainability criteria for file formats that are weighed for importance.There seems to be consensus on the sustainability criteria.However,as the weighing of these criteria is connected to an institution's policy,the KB wonders whether agreement on the relative importance of the criteria can be reached at all.With this paper,the KB hopes to inspire other cultural heritage institutions to define their own quantifiable file format evaluation method.

  4. Federating LHCb datasets using the DIRAC File catalog

    CERN Document Server

    Haen, Christophe; Frank, Markus; Tsaregorodtsev, Andrei

    2015-01-01

    In the distributed computing model of LHCb the File Catalog (FC) is a central component that keeps track of each file and replica stored on the Grid. It is federating the LHCb data files in a logical namespace used by all LHCb applications. As a replica catalog, it is used for brokering jobs to sites where their input data is meant to be present, but also by jobs for finding alternative replicas if necessary. The LCG File Catalog (LFC) used originally by LHCb and other experiments is now being retired and needs to be replaced. The DIRAC File Catalog (DFC) was developed within the framework of the DIRAC Project and presented during CHEP 2012. From the technical point of view, the code powering the DFC follows an Aspect oriented programming (AOP): each type of entity that is manipulated by the DFC (Users, Files, Replicas, etc) is treated as a separate 'concern' in the AOP terminology. Hence, the database schema can also be adapted to the needs of a Virtual Organization. LHCb opted for a highly tuned MySQL datab...

  5. Design and Implementation of Ceph: A Scalable Distributed File System

    Energy Technology Data Exchange (ETDEWEB)

    Weil, S A; Brandt, S A; Miller, E L; Long, D E; Maltzahn, C

    2006-04-19

    File system designers continue to look to new architectures to improve scalability. Object-based storage diverges from server-based (e.g. NFS) and SAN-based storage systems by coupling processors and memory with disk drives, delegating low-level allocation to object storage devices (OSDs) and decoupling I/O (read/write) from metadata (file open/close) operations. Even recent object-based systems inherit decades-old architectural choices going back to early UNIX file systems, however, limiting their ability to effectively scale to hundreds of petabytes. We present Ceph, a distributed file system that provides excellent performance and reliability with unprecedented scalability. Ceph maximizes the separation between data and metadata management by replacing allocation tables with a pseudo-random data distribution function (CRUSH) designed for heterogeneous and dynamic clusters of unreliable OSDs. We leverage OSD intelligence to distribute data replication, failure detection and recovery with semi-autonomous OSDs running a specialized local object storage file system (EBOFS). Finally, Ceph is built around a dynamic distributed metadata management cluster that provides extremely efficient metadata management that seamlessly adapts to a wide range of general purpose and scientific computing file system workloads. We present performance measurements under a variety of workloads that show superior I/O performance and scalable metadata management (more than a quarter million metadata ops/sec).

  6. Title list, publicly available documents: Three Mile Island Unit 1, Docket 50-289 - cumulated to November 16, 1979

    Energy Technology Data Exchange (ETDEWEB)

    None

    1979-01-01

    This title list of publicly available documents pertaining to Three Mile Island Unit 1, Docket 50-289, includes all documents pertaining to this Docket that had been filed in the NRC Public Document Room as of November 16, 1979. The categories used for filing and searching in the NRC Public Document Room are used to catalog the entries.

  7. Huygens file service and storage architecture

    NARCIS (Netherlands)

    Bosch, Peter; Mullender, Sape; Stabell-Kulo, Tage

    1993-01-01

    The Huygens file server is a high-performance file server which is able to deliver multi-media data in a timely manner while also providing clients with ordinary “Unix” like file I/O. The file server integrates client machines, file servers and tertiary storage servers in the same storage architectu

  8. Huygens file server and storage architecture

    NARCIS (Netherlands)

    Bosch, Peter; Mullender, Sape; Stabell-Kulo, Tage

    1993-01-01

    The Huygens file server is a high-performance file server which is able to deliver multi-media data in a timely manner while also providing clients with ordinary “Unix” like file I/O. The file server integrates client machines, file servers and tertiary storage servers in the same storage architectu

  9. 12 CFR 5.4 - Filing required.

    Science.gov (United States)

    2010-01-01

    ... CORPORATE ACTIVITIES Rules of General Applicability § 5.4 Filing required. (a) Filing. A depository institution shall file an application or notice with the OCC to engage in corporate activities and... advise an applicant through a pre-filing communication to send the filing or submission directly to...

  10. PFS: A Distributed and Customizable File System

    NARCIS (Netherlands)

    Bosch, Peter

    1996-01-01

    In this paper we present our ongoing work on the Pegasus File System (PFS), a distributed and customizable file system that can be used for off-line file system experiments and on-line file system storage. PFS is best described as an object-oriented component library from which either a true file sy

  11. Comparison of Workflow Scheduling Algorithms in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Navjot Kaur

    2011-10-01

    Full Text Available Cloud computing has gained popularity in recent times. Cloud computing is internet based computing, whereby shared resources, software and information are provided to computers and other devices on demand, like a public utility. Cloud computing is technology that uses the internet and central remote servers to maintain data and applications. This technology allows consumers and businesses to use application without installation and access their personal files at any computer with internet access. The main aim of my work is to study various problems, issues and types of scheduling algorithms for cloud workflows as well as on designing new workflow algorithms for cloud Workflow management system. The proposed algorithms are implemented on real time cloud which is developed using Microsoft .Net Technologies. The algorithms are compared with each other on the basis of parameters like Total execution time, Execution time for algorithm, Estimated execution time. Experimental results generated via simulation shown that Algorithm 2 is much better than Algorithm 1, as it reduced makespan time.

  12. JENDL fusion file 99

    Energy Technology Data Exchange (ETDEWEB)

    Chiba, Satoshi; Fukahori, Tokio; Shibata, Keiichi [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment; Yu Baosheng [China Institute of Atomic Energy, Beijing (China); Kosako, Kazuaki [Sumitomo Atomic Industries, Tokyo (Japan); Yamamuro, Nobuhiro [Data Engineering Co. Ltd., Yokohama, Kanagawa (Japan)

    2002-02-01

    The double-differential cross sections (DDXs) of secondary neutrons have been evaluated for 79 isotopes and 13 natural elements ranging from H to Bi to improve the accuracy of predictions for the neutronics calculations in the D-T thermonuclear fusion applications. The data given in JENDL-3.1, which was the newest version of JENDL general purpose file when this project was initiated, was combined with new calculations based on the optical model, DWBA, pre-equilibrium and multi-step statistical models, and the DDX data were generated based on various kinds of systematics for medium-mass nuclei. Different methods were employed for light nuclei to which the above method could not be applied. In addition, the DDXs for emission of charged particles (p, d, t, {sup 3}He and {alpha}-particle) were given for {sup 2}H, {sup 9}Be and elements heavier or equal to F. The present results give an overall good description of the measured DDX data of both the neutron and charged particles emission channels. The data were compiled in ENDF-6 format, and released in 1999 as a special purpose file of JENDL family, namely, JENDL Fusion File 99. (author)

  13. Evaluation of the TSC Dolphin Computer Assisted Instructional System in the Chapter 1 Program of the District of Columbia Public Schools. Final Report 85-9.

    Science.gov (United States)

    Harris, Carolyn DeMeyer; And Others

    Dolphin is a computer-assisted instruction system used to teach and reinforce skills in reading, language arts, and mathematics. An evaluation of this system was conducted to provide information to TSC Division of Houghton Mifflin regarding its effectiveness and possible modifications to the system. The general design of the evaluation was to…

  14. 77 FR 66841 - The Sherwin-Williams Company; Analysis of Proposed Consent Order To Aid Public Comment

    Science.gov (United States)

    2012-11-07

    ... Sherwin-Williams Company; Analysis of Proposed Consent Order To Aid Public Comment AGENCY: Federal Trade.... Write ``Sherwin-Williams, File No. 112 3198'' on your comment and file your comment online at https... consider your comment, we must receive it on or before November 26, 2012. Write ``Sherwin-Williams, File...

  15. 76 FR 48836 - Combined Notice of Filings

    Science.gov (United States)

    2011-08-09

    ... Line Company, LLC submits tariff filing per 154.403: S-2 Tracker Filing to be effective 8/1/2011. Filed...-000. Applicants: Cimarron River Pipeline, LLC. Description: 2011 Annual Report of Cash Out Activity...

  16. 78 FR 76293 - Combined Notice of Filings

    Science.gov (United States)

    2013-12-17

    ...: RP14-274-000. Applicants: NGO Transmission, Inc. Description: NGO Transmission, Inc. submits tariff filing per 154.204: NGO Transmission, Inc.--Negotiated Rate Filing to be effective 1/1/2014. Filed...

  17. 75 FR 47296 - Combined Notice of Filings

    Science.gov (United States)

    2010-08-05

    ... Palacios Gas Storage LLC. Description: Tres Palacios Gas Storage LLC submits tariff filing per 154.203: Tres Palacios Gas Storage LLC, Baseline Tariff Filing to be effective 7/28/2010. Filed Date:...

  18. Download this PDF file

    African Journals Online (AJOL)

    2007-08-02

    Aug 2, 2007 ... fore explores the propensity of female car owners in Akure to reduce their car trips and patronize public transport. Using a ... ate inefficiently in terms of energy consumption. ... use public transport, independent of their actual.

  19. Research in Computer Forensics

    Science.gov (United States)

    2002-06-01

    from many other sorts of systems. It includes viewgraphs covering a wide range of topics in digital forensic, audio recordings and examples from real...graphics files, video files and audio files; PDF format files; executable files or binary data files; files housing email archives and/or active... Steganography , combines encryption and data hiding to create a file system that makes digital evidence recovery and reconstruction very difficult. 24 139

  20. Public Values

    DEFF Research Database (Denmark)

    Beck Jørgensen, Torben; Rutgers, Mark R.

    2015-01-01

    administration is approached in terms of processes guided or restricted by public values and as public value creating: public management and public policy-making are both concerned with establishing, following and realizing public values. To study public values a broad perspective is needed. The article suggest......This article provides the introduction to a symposium on contemporary public values research. It is argued that the contribution to this symposium represent a Public Values Perspective, distinct from other specific lines of research that also use public value as a core concept. Public...... a research agenda for this encompasing kind of public values research. Finally the contributions to the symposium are introduced....