WorldWideScience

Sample records for shielding information computer

  1. Abstracts of digital computer code packages assembled by the Radiation Shielding Information Center

    Energy Technology Data Exchange (ETDEWEB)

    Carter, B.J.; Maskewitz, B.F.

    1985-04-01

    This publication, ORNL/RSIC-13, Volumes I to III Revised, has resulted from an internal audit of the first 168 packages of computing technology in the Computer Codes Collection (CCC) of the Radiation Shielding Information Center (RSIC). It replaces the earlier three documents published as single volumes between 1966 to 1972. A significant number of the early code packages were considered to be obsolete and were removed from the collection in the audit process and the CCC numbers were not reassigned. Others not currently being used by the nuclear R and D community were retained in the collection to preserve technology not replaced by newer methods, or were considered of potential value for reference purposes. Much of the early technology, however, has improved through developer/RSIC/user interaction and continues at the forefront of the advancing state-of-the-art.

  2. The SHIELD11 Computer Code

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, W

    2005-02-02

    SHIELD11 is a computer code for performing shielding analyses around a high-energy electron accelerator. It makes use of simple analytic expressions for the production and attenuation of photons and neutrons resulting from electron beams striking thick targets, such as dumps, stoppers, collimators, and other beam devices. The formulae in SHIELD11 are somewhat unpretentious in that they are based on the extrapolation (scaling) of experimental data using rather simple physics ideas. Because these scaling methods have only been tested over a rather limited set of conditions--namely, 1-15 GeV electrons striking 10-20 radiation lengths of iron--a certain amount of care and judgment must be exercised whenever SHIELD11 is used. Nevertheless, for many years these scaling methods have been applied rather successfully to a large variety of problems at SLAC, as well as at other laboratories throughout the world, and the SHIELD11 code has been found to be a fast and convenient tool. In this paper we present, without extensive theoretical justification or experimental verification, the five-component model on which the SHIELD11 code is based. Our intent is to demonstrate how to use the code by means of a few simple examples. References are provided that are considered to be essential for a full understanding of the model. The code itself contains many comments to provide some guidance for the informed user, who may wish to improve on the model.

  3. Abstracts of digital computer code packages. Assembled by the Radiation Shielding Information Center. [Radiation transport codes

    Energy Technology Data Exchange (ETDEWEB)

    McGill, B.; Maskewitz, B.F.; Anthony, C.M.; Comolander, H.E.; Hendrickson, H.R.

    1976-01-01

    The term ''code package'' is used to describe a miscellaneous grouping of materials which, when interpreted in connection with a digital computer, enables the scientist--user to solve technical problems in the area for which the material was designed. In general, a ''code package'' consists of written material--reports, instructions, flow charts, listings of data, and other useful material and IBM card decks (or, more often, a reel of magnetic tape) on which the source decks, sample problem input (including libraries of data) and the BCD/EBCDIC output listing from the sample problem are written. In addition to the main code, and any available auxiliary routines are also included. The abstract format was chosen to give to a potential code user several criteria for deciding whether or not he wishes to request the code package. (RWR)

  4. Information center as a technical institute unifying a user community. [Exemplified by Radiation Shielding Information Center at ORNL

    Energy Technology Data Exchange (ETDEWEB)

    Maskewitz, B.F.; McGill, B.; Hatmaker, N.A.

    1976-01-01

    The historical background to the information analysis center concept is presented first. The Radiation Shielding Information Center (RSIC) at ORNL is cited as an example of the information analysis center. RSIC objectives and scope are described, and RSIC's role in unification of the field of shielding is discussed. Some problems in handling information exchange with respect to computer codes are examined. (RWR)

  5. Basic EMC technology advancement for C(3) systems: SHIELD. Volume 4B. A digital computer program for computing crosstalk between shielded cables

    Science.gov (United States)

    Paul, C. R.

    1982-11-01

    This report contains the description and verification of a digital computer program, SHIELD, to be used in the prediction of crosstalk in transmission lines consisting of unshielded wires and/or shielded cables. The line may be above a ground plane (Type 1) or within an overall, circular, cylindrical shield which may be solid or braided and a wire (the shielded wire) located concentrically on the axis of the shield. All wires may be stranded and all conductors are treated as imperfect conductors; that is, their per-unit-length impedances are nonzero. Through-braid coupling for braided shields as well as diffusion for both types are included in the model. The shielded cables may have exposed sections at either end (pigtail sections) in which the shielded wire is not covered by the shield. Over these pigtail sections, a pigtail wire, parallel to the shielded wire, connects the shield to the reference conductor at that end via either a short circuit or an open circuit. These pigtail sections are included in the representation to simulate the common practice of terminating a shielded cable in a connector via these pigtail wires. The pigtail sections may be of different lengths. The program is written in FORTRAN IV and should be implementable on a wide range of digital computers.

  6. Information and computation

    OpenAIRE

    Vogler, Walter

    2000-01-01

    In this chapter, concepts related to information and computation are reviewed in the context of human computation. A brief introduction to information theory and different types of computation is given. Two examples of human computation systems, online social networks and Wikipedia, are used to illustrate how these can be described and compared in terms of information and computation.

  7. Bibliography, subject index, and author index of the literature examined by the radiation shielding information center. Volume 6. Reactor and weapons radiation shielding

    Energy Technology Data Exchange (ETDEWEB)

    1980-05-01

    An indexed bibliography is presented of literature selected by the Radiation Shielding Information Center since the previous volume was published in 1978 in the area of radiation transport and shielding against radiation from nuclear reactors, x-ray machines, radioisotopes, nuclear weapons (including fallout), and low energy accelerators (e.g., neutron generators). The bibliography was typeset from data processed by computer from magnetic tape files. In addition to lists of literature titles by subject categories (accessions 4951-6200), an author index is given.

  8. Quantum information and computation

    OpenAIRE

    Bub, Jeffrey

    2005-01-01

    This article deals with theoretical developments in the subject of quantum information and quantum computation, and includes an overview of classical information and some relevant quantum mechanics. The discussion covers topics in quantum communication, quantum cryptography, and quantum computation, and concludes by considering whether a perspective in terms of quantum information sheds new light on the conceptual problems of quantum mechanics.

  9. Bibliography, subject index, and author index of the literature examined by the Radiation Shielding Information Center. Volume 7

    Energy Technology Data Exchange (ETDEWEB)

    Trubey, D.K.; Roussin, R.W.; Gustin, A.B.

    1983-08-01

    An indexed bibliography of open literature selected by the Radiation Shielding Information Center since the previous volume was published in 1980 is presented in the area of radiation transport and shielding against radiation from nuclear reactors (fission and fusion), x-ray machines, radioisotopes, nuclear weapons (including fallout, and low energy accelerators (e.g., neutron generators). The bibliography was typeset from computer files constituting the RSIC Storage and Retrieval Information System. In addition to lists of literature titles by subject categories (accessions 6201-10156), an author index is given. Most of the literature selected for Volume VII was published in the years 1977 to 1981.

  10. Shielding calculations using computer techniques; Calculo de blindajes mediante tecnicas de computacion

    Energy Technology Data Exchange (ETDEWEB)

    Gonzalez Portilla, M. I.; Marquez, J.

    2011-07-01

    Radiological protection aims to limit the ionizing radiation received by people and equipment, which in numerous occasions requires of protection shields. Although, for certain configurations, there are analytical formulas, to characterize these shields, the design setup may be very intensive in numerical calculations, therefore the most efficient from to design the shields is by means of computer programs to calculate dose and dose rates. In the present article we review the codes most frequently used to perform these calculations, and the techniques used by such codes. (Author) 13 refs.

  11. Characterization of a lead breast shielding for dose reduction in computed tomography

    Energy Technology Data Exchange (ETDEWEB)

    Correia, Paula Duarte; Brochi, Marco Aurelio Corte; Azevedo-Marques, Paulo Mazzoncini de, E-mail: pauladuarte@usp.br [Universidade de Sao Paulo (FM/RSP), Ribeirao Preto, SP (Brazil). Faculdade de Medicina; Granzotti, Cristiano Roberto Fabri; Santos, Yago da Silva [Universidade de Sao Paulo (FFCLRP/RSP), Ribeirao Preto, SP (Brazil). Faculdade de Filosofia, Ciencias e Letras

    2014-07-15

    Objective: several studies have been published regarding the use of bismuth shielding to protect the breast in computed tomography (CT) scans and, up to the writing of this article, only one publication about barium shielding was found. The present study was aimed at characterizing, for the first time, a lead breast shielding. Materials and methods: the percentage dose reduction and the influence of the shielding on quantitative imaging parameters were evaluated. Dose measurements were made on a CT equipment with the aid of specific phantoms and radiation detectors. A processing software assisted in the qualitative analysis evaluating variations in average CT number and noise on images. Results: the authors observed a reduction in entrance dose by 30% and in CTDIvol by 17%. In all measurements, in agreement with studies in the literature, the utilization of cotton fiber as spacer object reduced significantly the presence of artifacts on the images. All the measurements demonstrated increase in the average CT number and noise on the images with the presence of the shielding. Conclusion: as expected, the data observed with the use of lead shielding were of the same order as those found in the literature about bismuth shielding. (author)

  12. Influence of lead apron shielding on absorbed doses from cone-beam computed tomography.

    Science.gov (United States)

    Rottke, Dennis; Andersson, Jonas; Ejima, Ken-Ichiro; Sawada, Kunihiko; Schulze, Dirk

    2017-06-01

    The aim of the present work was to investigate absorbed and to calculate effective doses (EDs) in cone-beam computed tomography (CBCT). The study was conducted using examination protocols with and without lead apron shielding. A full-body male RANDO® phantom was loaded with 110 GR200A thermoluminescence dosemeter chips at 55 different sites and set up in two different CBCT systems (CS 9500®, ProMax® 3D). Two different protocols were performed: the phantom was set up (1) with and (2) without a lead apron. No statistically significant differences in organ and absorbed doses from regions outside the primary beam could be found when comparing results from exposures with and without lead apron shielding. Consequently, calculating the ED showed no significant differences between the examination protocols with and without lead apron shielding. For the ProMax® 3D with shielding, the ED was 149 µSv, and for the examination protocol without shielding 148 µSv (SD = 0.31 µSv). For the CS 9500®, the ED was 88 and 86 µSv (SD = 0.95 µSv), respectively, with and without lead apron shielding. The results revealed no statistically significant differences in the absorbed doses between examination with and without lead apron shielding, especially in organs outside the primary beam. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  13. Computer and information science

    CERN Document Server

    2016-01-01

    This edited book presents scientific results of the 15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016) which was held on June 26– 29 in Okayama, Japan. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 12 of the conference’s most promising...

  14. Computing & Information Sciences

    Energy Technology Data Exchange (ETDEWEB)

    Dunning, T.H. Jr.; Lewis, J.R.

    1993-06-01

    Computing is an integral part of the research being conducted by scientists in the Molecular Sciences Research Center at Pacific Northwest Laboratory. The advanced computing infrastructure for the Computing and Information Sciences (C&IS) program of the Environmental and Molecular Sciences Laboratory will provide a state-of-the-art facility where scientific research can be performed to support US Department of Energy missions in environmental restoration and waste management, energy and environmental quality, and science and technology. The C&IS program is composed of five research and applied development facilities: High Performance Computing, Data Management and Archiving, Graphics and Visualization, Distributed Computing, Network Infrastructure, and Computer Instrumentation and Electronics. This report briefly describes the programs of these five facilities.

  15. HZETRN: Description of a free-space ion and nucleon transport and shielding computer program

    Science.gov (United States)

    Wilson, John W.; Badavi, Francis F.; Cucinotta, Francis A.; Shinn, Judy L.; Badhwar, Gautam D.; Silberberg, R.; Tsao, C. H.; Townsend, Lawrence W.; Tripathi, Ram K.

    1995-01-01

    The high-charge-and energy (HZE) transport computer program HZETRN is developed to address the problems of free-space radiation transport and shielding. The HZETRN program is intended specifically for the design engineer who is interested in obtaining fast and accurate dosimetric information for the design and construction of space modules and devices. The program is based on a one-dimensional space-marching formulation of the Boltzmann transport equation with a straight-ahead approximation. The effect of the long-range Coulomb force and electron interaction is treated as a continuous slowing-down process. Atomic (electronic) stopping power coefficients with energies above a few A MeV are calculated by using Bethe's theory including Bragg's rule, Ziegler's shell corrections, and effective charge. Nuclear absorption cross sections are obtained from fits to quantum calculations and total cross sections are obtained with a Ramsauer formalism. Nuclear fragmentation cross sections are calculated with a semiempirical abrasion-ablation fragmentation model. The relation of the final computer code to the Boltzmann equation is discussed in the context of simplifying assumptions. A detailed description of the flow of the computer code, input requirements, sample output, and compatibility requirements for non-VAX platforms are provided.

  16. Computer/Information Science

    Science.gov (United States)

    Birman, Ken; Roughgarden, Tim; Seltzer, Margo; Spohrer, Jim; Stolterman, Erik; Kearsley, Greg; Koszalka, Tiffany; de Jong, Ton

    2013-01-01

    Scholars representing the field of computer/information science were asked to identify what they considered to be the most exciting and imaginative work currently being done in their field, as well as how that work might change our understanding. The scholars included Ken Birman, Jennifer Rexford, Tim Roughgarden, Margo Seltzer, Jim Spohrer, and…

  17. PAEDIATRIC NECK MULTIDETECTOR COMPUTED TOMOGRAPHY: THE EFFECT OF BISMUTH SHIELDING ON THYROID DOSE AND IMAGE QUALITY.

    Science.gov (United States)

    Inkoom, Stephen; Papadakis, Antonios E; Raissaki, Maria; Perisinakis, Kostas; Schandorf, Cyril; Fletcher, John J; Damilakis, John

    2017-04-15

    This study investigated the effect of bismuth shielding on thyroid dose and image quality in paediatric neck multidetector computed tomography (MDCT) performed with fixed tube current (FTC) and automatic exposure control (AEC). Four paediatric anthropomorphic phantoms representing the equivalent newborn, 1-, 5- and 10-y-old child were subjected to neck CT using a 16-slice MDCT system. Each scan was performed without and with single- and double-layered bismuth shield placed on the skin surface above the thyroid. Scans were repeated with cotton spacers of 1, 2 and 3 cm thick placed between the skin and shield, to study the effect of skin-to-shielding distance on image noise. Thyroid dose was measured with thermoluminescent dosemeters. The location of the thyroid within the phantom slices was determined by anthropometric data from patients' CT examinations whose body stature closely matched the phantoms. Effective dose (E) was estimated using the dose-length product (DLP) method. Image quality of resulted CT images was assessed through the image noise. Activation of AEC was found to decrease the thyroid dose by 46 % to the 10-y-old phantom subjected to neck CT. When FTC technique is used, single- and double-layered bismuth shielding was found to reduce the thyroid dose to the same phantom by 35 and 47 %, respectively. The corresponding reductions in AEC-activated scans were 60 and 66 %, respectively. Elevation of shields by 1-, 2- and 3-cm cotton spacers decreased the image noise by 69, 87 and 92 %, respectively, for single-layered FTC, without considerably affecting the thyroid dose. AEC was more effective in thyroid dose reduction than in-plane bismuth shields. Application of cotton spacers had no significant impact on thyroid dose, but significantly decreased the image noise. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  18. Soft computing in computer and information science

    CERN Document Server

    Fray, Imed; Pejaś, Jerzy

    2015-01-01

    This book presents a carefully selected and reviewed collection of papers presented during the 19th Advanced Computer Systems conference ACS-2014. The Advanced Computer Systems conference concentrated from its beginning on methods and algorithms of artificial intelligence. Further future brought new areas of interest concerning technical informatics related to soft computing and some more technological aspects of computer science such as multimedia and computer graphics, software engineering, web systems, information security and safety or project management. These topics are represented in the present book under the categories Artificial Intelligence, Design of Information and Multimedia Systems, Information Technology Security and Software Technologies.

  19. Understanding computer and information technology

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Yun Cheol; Han, Tack Don; Im, Sun Beom

    2009-01-15

    This book consists of four parts. The first part describes IT technology and information community understanding of computer system, constitution of software system and information system and application of software. The second part is about computer network, information and communication, application and internet service. The third part contains application and multi media, application of mobile computer, ubiquitous computing and ubiquitous environment and computer and digital life. The last part explains information security and ethics of information-oriented society, information industry and IT venture, digital contents technology and industry and the future and development of information-oriented society.

  20. Radiation Shielding Materials Containing Hydrogen, Boron, and Nitrogen: Systematic Computational and Experimental Study. Phase I

    Science.gov (United States)

    Thibeault, Sheila A.; Fay, Catharine C.; Lowther, Sharon E.; Earle, Kevin D.; Sauti, Godfrey; Kang, Jin Ho; Park, Cheol; McMullen, Amelia M.

    2012-01-01

    The key objectives of this study are to investigate, both computationally and experimentally, which forms, compositions, and layerings of hydrogen, boron, and nitrogen containing materials will offer the greatest shielding in the most structurally robust combination against galactic cosmic radiation (GCR), secondary neutrons, and solar energetic particles (SEP). The objectives and expected significance of this research are to develop a space radiation shielding materials system that has high efficacy for shielding radiation and that also has high strength for load bearing primary structures. Such a materials system does not yet exist. The boron nitride nanotube (BNNT) can theoretically be processed into structural BNNT and used for load bearing structures. Furthermore, the BNNT can be incorporated into high hydrogen polymers and the combination used as matrix reinforcement for structural composites. BNNT's molecular structure is attractive for hydrogen storage and hydrogenation. There are two methods or techniques for introducing hydrogen into BNNT: (1) hydrogen storage in BNNT, and (2) hydrogenation of BNNT (hydrogenated BNNT). In the hydrogen storage method, nanotubes are favored to store hydrogen over particles and sheets because they have much larger surface areas and higher hydrogen binding energy. The carbon nanotube (CNT) and BNNT have been studied as potentially outstanding hydrogen storage materials since 1997. Our study of hydrogen storage in BNNT - as a function of temperature, pressure, and hydrogen gas concentration - will be performed with a hydrogen storage chamber equipped with a hydrogen generator. The second method of introducing hydrogen into BNNT is hydrogenation of BNNT, where hydrogen is covalently bonded onto boron, nitrogen, or both. Hydrogenation of BN and BNNT has been studied theoretically. Hyper-hydrogenated BNNT has been theoretically predicted with hydrogen coverage up to 100% of the individual atoms. This is a higher hydrogen content

  1. Information causality and noisy computations

    Energy Technology Data Exchange (ETDEWEB)

    Hsu, Li-Yi [Department of Physics, Chung Yuan Christian University, Chung-li 32023, Taiwan (China); Yu, I-Ching; Lin, Feng-Li [Department of Physics, National Taiwan Normal University, Taipei 116, Taiwan (China)

    2011-10-15

    We reformulate the information causality in a more general framework by adopting the results of signal propagation and computation in a noisy circuit. In our framework, the information causality leads to a broad class of Tsirelson inequalities. This fact allows us to subject information causality to experimental scrutiny. A no-go theorem for reliable nonlocal computation is also derived. Information causality prevents any physical circuit from performing reliable computations.

  2. [A computer-supported method for the direct production of shielding blocks and compensators for radiotherapy].

    Science.gov (United States)

    Kober, B; Müller-Sievers, K; Schröder, U G; Stratmann, H

    1990-06-01

    The homogeneous irradiation of irregularly shaped targets with high doses and the simultaneous protection of the equally irregular surrounding high risk regions can be carried out with the help of shielding blocks and compensation filters specially cut for individual use. The machines offered on the market that help in their production have serious drawbacks in spite of the advanced technology used. These machines with limited usage are not only expensive but also require personnel to control the several steps the production of the blocks and filters involves. Safer radiotherapy however demands a more intensive use of these protective measures. However, it is now possible to overcome the drawbacks we have mentioned. The projection of the contours of the block marked on the X-ray on the shielding blocks can be carried out directly with the help of the computer that directs the radiotherapy. This computer could be connected to a multipurpose CNC milling machine. Similarly, one could, in the near future, use the data from computed tomograms in the computer used to plan the radiotherapy to mould three dimensional compensation filters. The cutting out of the negative moulds from Styrodur, the casting with fluid metal alloys, the imprecision that follows, as well as the health hazards and environmental pollution attached to his process could then be avoided, not to speak of the possibility of total reutilization of the rests. The positioning of the block ensemble can follow effortlessly and with precision on the lucite plates which have been drilled to accommodate the blocks.

  3. JANE, A new information retrieval system for the Radiation Shielding Information Center

    Energy Technology Data Exchange (ETDEWEB)

    Trubey, D.K.

    1991-05-01

    A new information storage and retrieval system has been developed for the Radiation Shielding Information Center (RSIC) at Oak Ridge National Laboratory to replace mainframe systems that have become obsolete. The database contains citations and abstracts of literature which were selected by RSIC analysts and indexed with terms from a controlled vocabulary. The database, begun in 1963, has been maintained continuously since that time. The new system, called JANE, incorporates automatic indexing techniques and on-line retrieval using the RSIC Data General Eclipse MV/4000 minicomputer, Automatic indexing and retrieval techniques based on fuzzy-set theory allow the presentation of results in order of Retrieval Status Value. The fuzzy-set membership function depends on term frequency in the titles and abstracts and on Term Discrimination Values which indicate the resolving power of the individual terms. These values are determined by the Cover Coefficient method. The use of a commercial database base to store and retrieve the indexing information permits rapid retrieval of the stored documents. Comparisons of the new and presently-used systems for actual searches of the literature indicate that it is practical to replace the mainframe systems with a minicomputer system similar to the present version of JANE. 18 refs., 10 figs.

  4. Subquantum information and computation

    Indian Academy of Sciences (India)

    It is argued that immense physical resources – for nonlocal communication, espionage, and exponentially-fast computation – are hidden from us by quantum noise, and ... Theoretical Physics Group, Blackett Laboratory, Imperial College, Prince Consort Road, London SW7 2BZ, England; Department of Physics, Center for ...

  5. Bibliography, subject index, and author index of the literature examined by the Radiation Shielding Information Center (Reactor and Weapons Radiation Shielding). [1973--1976

    Energy Technology Data Exchange (ETDEWEB)

    1978-01-01

    An indexed bibliography is presented of literature selected by the Radiation Shielding Information Center since the previous volume was published in 1974 in the area of radiation transport and shielding against radiation from nuclear reactors, x-ray machines, radioisotopes, nuclear weapons (including fallout), and low-energy accelerators (e.g., neutron generators). In addition to lists of literature titles by subject categories (accessions 3501-4950), author and keyword indexes are given. Most of the literature selected for Vol. V was published in the years 1973 to 1976.

  6. Shielding Effectiveness of Laminated Shields

    Directory of Open Access Journals (Sweden)

    B. P. Rao

    2008-12-01

    Full Text Available Shielding prevents coupling of undesired radiated electromagnetic energy into equipment otherwise susceptible to it. In view of this, some studies on shielding effectiveness of laminated shields with conductors and conductive polymers using plane-wave theory are carried out in this paper. The plane wave shielding effectiveness of new combination of these materials is evaluated as a function of frequency and thickness of material. Conductivity of the polymers, measured in previous investigations by the cavity perturbation technique, is used to compute the overall reflection and transmission coefficients of single and multiple layers of the polymers. With recent advances in synthesizing stable highly conductive polymers these lightweight mechanically strong materials appear to be viable alternatives to metals for EM1 shielding.

  7. INFORMATION-MEASURING SYSTEM FOR EVALUATION OF ELECTROMAGNETIC RADIATION POWER LEVELS INFLUENCE TO ITS WEAKENED BY PROTECTIVE SHIELDS

    Directory of Open Access Journals (Sweden)

    O. V. Boiprav

    2013-01-01

    Full Text Available An information-measuring system and realized on the basis of its methodology used for evaluation of electromagnetic radiation power levels passing via the protective shielding construction are described. It’s proposed to use the developed methodology for the testing of electromagnetic radiation shields for anechoic chambers

  8. Information processing, computation, and cognition.

    Science.gov (United States)

    Piccinini, Gualtiero; Scarantino, Andrea

    2011-01-01

    Computation and information processing are among the most fundamental notions in cognitive science. They are also among the most imprecisely discussed. Many cognitive scientists take it for granted that cognition involves computation, information processing, or both - although others disagree vehemently. Yet different cognitive scientists use 'computation' and 'information processing' to mean different things, sometimes without realizing that they do. In addition, computation and information processing are surrounded by several myths; first and foremost, that they are the same thing. In this paper, we address this unsatisfactory state of affairs by presenting a general and theory-neutral account of computation and information processing. We also apply our framework by analyzing the relations between computation and information processing on one hand and classicism, connectionism, and computational neuroscience on the other. We defend the relevance to cognitive science of both computation, at least in a generic sense, and information processing, in three important senses of the term. Our account advances several foundational debates in cognitive science by untangling some of their conceptual knots in a theory-neutral way. By leveling the playing field, we pave the way for the future resolution of the debates' empirical aspects.

  9. Radiation Shielding Materials Containing Hydrogen, Boron, and Nitrogen: Systematic Computational and Experimental Study Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The objectives of the proposed research are to develop a space radiation shielding material system that has high efficacy for shielding radiation and also has high...

  10. Effects of shielding the radiosensitive superficial organs of ORNL pediatric phantoms on dose reduction in computed tomography

    Directory of Open Access Journals (Sweden)

    Parisa Akhlaghi

    2014-01-01

    Full Text Available In computed tomography (CT, some superficial organs which have increased sensitivity to radiation, receive doses that are significant enough to be matter of concern. Therefore, in this study, the effects of using shields on the amount of dose reduction and image quality was investigated for pediatric imaging. Absorbed doses of breasts, eyes, thyroid and testes of a series of pediatric phantoms without and with different thickness of bismuth and lead were calculated by Monte Carlo simulation. Appropriate thicknesses of shields were chosen based on their weights, X-ray spectrum, and the amount of dose reduction. In addition, the effect of lead shield on image quality of a simple phantom was assessed quantitatively using region of interest (ROI measurements. Considering the maximum reduction in absorbed doses and X-ray spectrum, using a lead shield with a maximum thickness of 0.4 mm would be appropriate for testes and thyroid and two other organs (which are exposed directly should be protected with thinner shields. Moreover, the image quality assessment showed that lead was associated with significant increases in both noise and CT attenuation values, especially in the anterior of the phantom. Overall, the results suggested that shielding is a useful optimization tool in CT.

  11. Institutional computing (IC) information session

    Energy Technology Data Exchange (ETDEWEB)

    Koch, Kenneth R [Los Alamos National Laboratory; Lally, Bryan R [Los Alamos National Laboratory

    2011-01-19

    The LANL Institutional Computing Program (IC) will host an information session about the current state of unclassified Institutional Computing at Los Alamos, exciting plans for the future, and the current call for proposals for science and engineering projects requiring computing. Program representatives will give short presentations and field questions about the call for proposals and future planned machines, and discuss technical support available to existing and future projects. Los Alamos has started making a serious institutional investment in open computing available to our science projects, and that investment is expected to increase even more.

  12. Multi-objective optimization of a compact pressurized water nuclear reactor computational model for biological shielding design using innovative materials

    Energy Technology Data Exchange (ETDEWEB)

    Tunes, M.A., E-mail: matheus.tunes@usp.br [Department of Metallurgical and Materials Engineering, Escola Politécnica da Universidade de São Paulo, Av. Prof. Mello Moraes, 2463 – CEP 05508 – 030 São Paulo (Brazil); Oliveira, C.R.E. de, E-mail: cassiano@unm.edu [Department of Nuclear Engineering, The University of New Mexico, Farris Engineering Center, 221, Albuquerque, NM 87131-1070 (United States); Schön, C.G., E-mail: schoen@usp.br [Department of Metallurgical and Materials Engineering, Escola Politécnica da Universidade de São Paulo, Av. Prof. Mello Moraes, 2463 – CEP 05508 – 030 São Paulo (Brazil)

    2017-03-15

    Highlights: • Use of two n-γ transport codes leads to optimized model of compact nuclear reactor. • It was possible to safely reduce both weight and volume of the biological shielding. • Best configuration obtained by using new composites for both γ and n attenuation. - Abstract: The aim of the present work is to develop a computational model of a compact pressurized water nuclear reactor (PWR) to investigate the use of innovative materials to enhance the biological shielding effectiveness. Two radiation transport codes were used: the first one – MCNP – for the PWR design and the GEM/EVENT to simulate (in a 1D slab) the behavior of several materials and shielding thickness on gamma and neutron radiation. Additionally MATLAB Optimization Toolbox was used to provide new geometric configurations of the slab aiming at reducing the volume and weight of the walls by means of a cost/objective function. It is demonstrated in the reactor model that the dose rate outside biological shielding has been reduced by one order of magnitude for the optimized model compared with the initial configuration. Volume and weight of the shielding walls were also reduced. The results indicated that one-dimensional deterministic code to reach an optimized geometry and test materials, combined with a three-dimensional model of a compact nuclear reactor in a stochastic code, is a fast and efficient procedure to test shielding performance and optimization before the experimental assessment. A major outcome of this research is that composite materials (ECOMASS 2150TU96) may replace (with advantages) traditional shielding materials without jeopardizing the nuclear power plant safety assurance.

  13. Information technology and computational physics

    CERN Document Server

    Kóczy, László; Mesiar, Radko; Kacprzyk, Janusz

    2017-01-01

    A broad spectrum of modern Information Technology (IT) tools, techniques, main developments and still open challenges is presented. Emphasis is on new research directions in various fields of science and technology that are related to data analysis, data mining, knowledge discovery, information retrieval, clustering and classification, decision making and decision support, control, computational mathematics and physics, to name a few. Applications in many relevant fields are presented, notably in telecommunication, social networks, recommender systems, fault detection, robotics, image analysis and recognition, electronics, etc. The methods used by the authors range from high level formal mathematical tools and techniques, through algorithmic and computational tools, to modern metaheuristics.

  14. Computer and information security handbook

    CERN Document Server

    Vacca, John R

    2012-01-01

    The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed

  15. Management Information System & Computer Applications

    OpenAIRE

    Sreeramana Aithal

    2017-01-01

    The book contains following Chapters : Chapter 1 : Introduction to Management Information Systems, Chapter 2 : Structure of MIS, Chapter 3 : Planning for MIS, Chapter 4 : Introduction to Computers Chapter 5 : Decision Making Process in MIS Chapter 6 : Approaches for System Development Chapter 7 : Form Design Chapter 8 : Charting Techniques Chapter 9 : System Analysis & Design Chapter 10 : Applications of MIS in Functional Areas Chapter 11 : System Implement...

  16. iSHIELD - A Line Source Application of SHIELD11

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, W.R.; Rokni, S.H.; /SLAC

    2006-04-27

    iSHIELD11 performs a line-source numerical integration of radiation source terms that are defined by the iSHIELD11 computer code[1] . An example is provided to demonstrate how one can use iSHIELD11 to perform a shielding analysis for a 250 GeV electron linear accelerator.

  17. Statistical Computing in Information Society

    Directory of Open Access Journals (Sweden)

    Domański Czesław

    2015-12-01

    Full Text Available In the presence of massive data coming with high heterogeneity we need to change our statistical thinking and statistical education in order to adapt both - classical statistics and software developments that address new challenges. Significant developments include open data, big data, data visualisation, and they are changing the nature of the evidence that is available, the ways in which it is presented and the skills needed for its interpretation. The amount of information is not the most important issue – the real challenge is the combination of the amount and the complexity of data. Moreover, a need arises to know how uncertain situations should be dealt with and what decisions should be taken when information is insufficient (which can also be observed for large datasets. In the paper we discuss the idea of computational statistics as a new approach to statistical teaching and we try to answer a question: how we can best prepare the next generation of statisticians.

  18. The Radiation Safety Information Computational Center (RSICC): A Resource for Nuclear Science Applications

    Energy Technology Data Exchange (ETDEWEB)

    Kirk, Bernadette Lugue [ORNL

    2009-01-01

    The Radiation Safety Information Computational Center (RSICC) has been in existence since 1963. RSICC collects, organizes, evaluates and disseminates technical information (software and nuclear data) involving the transport of neutral and charged particle radiation, and shielding and protection from the radiation associated with: nuclear weapons and materials, fission and fusion reactors, outer space, accelerators, medical facilities, and nuclear waste management. RSICC serves over 12,000 scientists and engineers from about 100 countries. An important activity of RSICC is its participation in international efforts on computational and experimental benchmarks. An example is the Shielding Integral Benchmarks Archival Database (SINBAD), which includes shielding benchmarks for fission, fusion and accelerators. RSICC is funded by the United States Department of Energy, Department of Homeland Security and Nuclear Regulatory Commission.

  19. Design of a management information system for the Shielding Experimental Reactor ageing management

    Energy Technology Data Exchange (ETDEWEB)

    He Jie, E-mail: hejiejoe@163.co [Institute of Nuclear and New Energy Technology, Tsinghua University, Beijing 100084 (China); Xu Xianhong [Institute of Nuclear and New Energy Technology, Tsinghua University, Beijing 100084 (China)

    2010-01-15

    The problem of nuclear reactor ageing is a topic of increasing importance in nuclear safety recent years. Ageing management is usually implemented for reactors maintenance. In the practice, a large number of data and records need to be processed. However, there are few professional software applications that aid reactor ageing management, especially for research reactors. This paper introduces the design of a new web-based management information system (MIS), named the Shielding Experimental Reactor Ageing Management Information System (SERAMIS). It is an auxiliary means that helps to collect data, keep records, and retrieve information for a research reactor ageing management. The Java2 Enterprise Edition (J2EE) and network database techniques, such as three-tiered model, Model-View-Controller architecture, transaction-oriented operations, and JavaScript techniques, are used in the development of this system. The functionalities of the application cover periodic safety review (PSR), regulatory references, data inspection, and SSCs classification according to ageing management methodology. Data and examples are presented to demonstrate the functionalities. For future work, techniques of data mining will be employed to support decision-making.

  20. Assessment of breast absorbed doses during thoracic computed tomography scan to evaluate the effectiveness of bismuth shielding.

    Science.gov (United States)

    Alonso, Thessa C; Mourão, Arnaldo P; Santana, Priscila C; da Silva, Teógenes A

    2016-11-01

    During a lung computed tomography (CT) examination, breast and nearby radiosensitive organs are unnecessarily irradiated because they are in the path of the primary beam. The purpose of this paper is to determine the absorbed dose in breast and nearby organs for unshielded and shielded exposures with bismuth. The experiment was done with a female anthropomorphic phantom undergoing a typical thoracic CT scan, with TLD-100 thermoluminescent detectors insert at breast, lung and thyroid positions. Results showed that dose reduction due to bismuth shielding was approximately 30% and 50% for breast and thyroid, respectively; however, the influence of the bismuth on the image quality needs to be considered. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Dynamics of Information as Natural Computation

    Directory of Open Access Journals (Sweden)

    Gordana Dodig Crnkovic

    2011-08-01

    Full Text Available Processes considered rendering information dynamics have been studied, among others in: questions and answers, observations, communication, learning, belief revision, logical inference, game-theoretic interactions and computation. This article will put the computational approaches into a broader context of natural computation, where information dynamics is not only found in human communication and computational machinery but also in the entire nature. Information is understood as representing the world (reality as an informational web for a cognizing agent, while information dynamics (information processing, computation realizes physical laws through which all the changes of informational structures unfold. Computation as it appears in the natural world is more general than the human process of calculation modeled by the Turing machine. Natural computing is epitomized through the interactions of concurrent, in general asynchronous computational processes which are adequately represented by what Abramsky names “the second generation models of computation” [1] which we argue to be the most general representation of information dynamics.

  2. Quantitative assessment of selective in-plane shielding of tissues in computed tomography through evaluation of absorbed dose and image quality

    Energy Technology Data Exchange (ETDEWEB)

    Geleijns, J.; Veldkamp, W.J.H. [Leiden University Medical Center, Radiology Department, ZA Leiden (Netherlands); Salvado Artells, M.; Lopez Tortosa, M. [Universitat Rovira i Virgili, Facultat de Medicina i Ciencies de la Salut, Departament de Ciencies Mediques Basiques, Reus, Tarragona (Spain); Calzado Cantera, A. [Universidad Complutense de Madrid, Departamento de Radiologia, Madrid (Spain)

    2006-10-15

    This study aimed at assessment of efficacy of selective in-plane shielding in adults by quantitative evaluation of the achieved dose reduction and image quality. Commercially available accessories for in-plane shielding of the eye lens, thyroid and breast, and an anthropomorphic phantom were used for the evaluation of absorbed dose and image quality. Organ dose and total energy imparted were assessed by means of a Monte Carlo technique taking into account tube voltage, tube current, and scanner type. Image quality was quantified as noise in soft tissue. Application of the lens shield reduced dose to the lens by 27% and to the brain by 1%. The thyroid shield reduced thyroid dose by 26%; the breast shield reduced dose to the breasts by 30% and to the lungs by 15%. Total energy imparted (unshielded/shielded) was 88/86 mJ for computed tomography (CT) brain, 64/60 mJ for CT cervical spine, and 289/260 mJ for CT chest scanning. An increase in image noise could be observed in the ranges were bismuth shielding was applied. The observed reduction of organ dose and total energy imparted could be achieved more efficiently by a reduction of tube current. The application of in-plane selective shielding is therefore discouraged. (orig.)

  3. Computing handbook information systems and information technology

    CERN Document Server

    Topi, Heikki

    2014-01-01

    Disciplinary Foundations and Global ImpactEvolving Discipline of Information Systems Heikki TopiDiscipline of Information Technology Barry M. Lunt and Han ReichgeltInformation Systems as a Practical Discipline Juhani IivariInformation Technology Han Reichgelt, Joseph J. Ekstrom, Art Gowan, and Barry M. LuntSociotechnical Approaches to the Study of Information Systems Steve Sawyer and Mohammad Hossein JarrahiIT and Global Development Erkki SutinenUsing ICT for Development, Societal Transformation, and Beyond Sherif KamelTechnical Foundations of Data and Database ManagementData Models Avi Silber

  4. Philosophy, computing and information science

    CERN Document Server

    Hagengruber, Ruth

    2014-01-01

    Over the last four decades computers and the internet have become an intrinsic part of all our lives, but this speed of development has left related philosophical enquiry behind. Featuring the work of computer scientists and philosophers, these essays provide an overview of an exciting new area of philosophy that is still taking shape.

  5. Coherent information structure in complex computation.

    Science.gov (United States)

    Lizier, Joseph T; Prokopenko, Mikhail; Zomaya, Albert Y

    2012-09-01

    We have recently presented a framework for the information dynamics of distributed computation that locally identifies the component operations of information storage, transfer, and modification. We have observed that while these component operations exist to some extent in all types of computation, complex computation is distinguished in having coherent structure in its local information dynamics profiles. In this article, we conjecture that coherent information structure is a defining feature of complex computation, particularly in biological systems or artificially evolved computation that solves human-understandable tasks. We present a methodology for studying coherent information structure, consisting of state-space diagrams of the local information dynamics and a measure of structure in these diagrams. The methodology identifies both clear and "hidden" coherent structure in complex computation, most notably reconciling conflicting interpretations of the complexity of the Elementary Cellular Automata rule 22.

  6. The Radiation Safety Information Computational Center (RSICC): A Resource for Nuclear Science Applications

    Energy Technology Data Exchange (ETDEWEB)

    Kirk, Bernadette Lugue [ORNL

    2009-01-01

    The Radiation Safety Information Computational Center (RSICC) has been in existence since 1963. RSICC collects, organizes, evaluates and disseminates technical information (software and nuclear data) involving the transport of neutral and charged particle radiation, and shielding and protection from the radiation associated with: nuclear weapons and materials, fission and fusion reactors, outer space, accelerators, medical facilities, and nuclear waste management. RSICC serves over 12,000 scientists and engineers from about 100 countries.

  7. Computer virus information update CIAC-2301

    Energy Technology Data Exchange (ETDEWEB)

    Orvis, W.J.

    1994-01-15

    While CIAC periodically issues bulletins about specific computer viruses, these bulletins do not cover all the computer viruses that affect desktop computers. The purpose of this document is to identify most of the known viruses for the MS-DOS and Macintosh platforms and give an overview of the effects of each virus. The authors also include information on some windows, Atari, and Amiga viruses. This document is revised periodically as new virus information becomes available. This document replaces all earlier versions of the CIAC Computer virus Information Update. The date on the front cover indicates date on which the information in this document was extracted from CIAC`s Virus database.

  8. Computer Information Products at NTIS.

    Science.gov (United States)

    Weisman, Stuart M.

    1988-01-01

    Describes the services and products provided by the National Technical Information Service, which collects, organizes, and markets technical information generated by U.S. and foreign governments in all areas of science and technology. (CLB)

  9. Federal High End Computing (HEC) Information Portal

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — This portal provides information about opportunities to engage in U.S. Federal government high performance computing activities, including supercomputer use,...

  10. New Information Dispersal Techniques for Trustworthy Computing

    Science.gov (United States)

    Parakh, Abhishek

    2011-01-01

    Information dispersal algorithms (IDA) are used for distributed data storage because they simultaneously provide security, reliability and space efficiency, constituting a trustworthy computing framework for many critical applications, such as cloud computing, in the information society. In the most general sense, this is achieved by dividing data…

  11. Computational Design of Epoxy/ Boron Carbide Nanocomposites for Radiation Shielding Applications

    Science.gov (United States)

    Bejagam, Karteek; Galehdari, Nasim; Espinosa, Ingrid; Deshmukh, Sanket A.; Kelkar, Ajit D.

    An individual working in industries that include nuclear power plants, healthcare industry, and aerospace are knowingly or unknowingly exposed to radiations of different energies. Exposure to high-energy radiations such as α/ β particle emissions or gamma ray electromagnetic radiations enhances the health risks that can lead to carcinogenesis, cardiac problems, cataracts, and other acute radiation syndromes. The best possible solution to protect one from the exposure to radiations is shielding. In the present study, we have developed a new algorithm to generate a range of different structures of Diglycidyl Ether of Bisphenol F (EPON 862) and curing agent Diethylene Toluene Diamine (DETDA) resins with varying degrees of crosslinking. 3, 5, and 10 weight percent boron carbide was employed as filling materials to study its influence on the thermal and mechanical properties of composite. We further conduct the reactive molecular dynamics (RMD) simulations to investigate the effect of radiation exposure on the structural, physical, and mechanical properties of these Epoxy/Boron Carbide nanocomposites. Where possible the simulation results were compared with the experimental data.

  12. Gonadal shielding and collimation information for pelvic radiography in podiatric practice

    Energy Technology Data Exchange (ETDEWEB)

    Kalin, A.G.

    1976-01-01

    Pelvic x-rays are often necessary in podiatric practice, to aid in the diagnosis of podiatric and foot-related disorders. The disorders which warrant such x-rays are reviewed. The author urges caution in the administration of pelvic x-rays, citing the possible genetic effects of gonadal exposure to x-rays. Various methods of dose reduction are discussed, with special emphasis on collimators to confine radiation to the smallest body area and gonadal shields to protect the gonads when they fall within the direct x-ray beam.

  13. Computational Intelligence in Information Systems Conference

    CERN Document Server

    Au, Thien-Wan; Omar, Saiful

    2017-01-01

    This book constitutes the Proceedings of the Computational Intelligence in Information Systems conference (CIIS 2016), held in Brunei, November 18–20, 2016. The CIIS conference provides a platform for researchers to exchange the latest ideas and to present new research advances in general areas related to computational intelligence and its applications. The 26 revised full papers presented in this book have been carefully selected from 62 submissions. They cover a wide range of topics and application areas in computational intelligence and informatics.

  14. Nanophotonic information physics nanointelligence and nanophotonic computing

    CERN Document Server

    2014-01-01

    This book provides a new direction in the field of nano-optics and nanophotonics from information and computing-related sciences and technology. Entitled by "Information Physics and Computing in NanosScale Photonics and Materials”, IPCN in short, the book aims to bring together recent progresses in the intersection of nano-scale photonics, information, and enabling technologies. The topic will include (1) an overview of information physics in nanophotonics, (2) DNA self-assembled nanophotonic systems, (3) Functional molecular sensing, (4) Smart fold computing, an architecture for nanophotonics, (5) semiconductor nanowire and its photonic applications, (6) single photoelectron manipulation in imaging sensors, (6) hierarchical nanophotonic systems, (8) photonic neuromorphic computing, and (9) SAT solver and decision making based on nanophotonics.

  15. Philosophy of computing and information technology

    NARCIS (Netherlands)

    Brey, Philip A.E.; Soraker, Johnny; Meijers, A.

    2009-01-01

    Philosophy has been described as having taken a “computational turn,” referring to the ways in which computers and information technology throw new light upon traditional philosophical issues, provide new tools and concepts for philosophical reasoning, and pose theoretical and practical questions

  16. Computer science research. Computation and Information Services Directorate

    Energy Technology Data Exchange (ETDEWEB)

    McGraw, J.R.; Van Dyke, P.T. (eds.)

    1985-01-01

    Research activities in computer science and numerical analysis carried out within the Computation and Information Services Directorate of Lawrence Livermore National Laboratory are highlighted. A technical introduction to current areas of study is given, and recent progress is reported. Current research features a heavy emphasis on multiprocessing, which plays a major role in nearly every proposed new supercomputer system. In addition to multiprocessing, strong efforts continue in some of the more traditional areas of computer science, particularly numerical methods. Specific content of the report includes chapters on numerical algorithms, software interfaces, architectures and networks, future directions, project funding, and project contacts. (DWL)

  17. Computer Simulation in Information and Communication Engineering

    CERN Multimedia

    Anton Topurov

    2005-01-01

    CSICE'05 Sofia, Bulgaria 20th - 22nd October, 2005 On behalf of the International Scientific Committee, we would like to invite you all to Sofia, the capital city of Bulgaria, to the International Conference in Computer Simulation in Information and Communication Engineering CSICE'05. The Conference is aimed at facilitating the exchange of experience in the field of computer simulation gained not only in traditional fields (Communications, Electronics, Physics...) but also in the areas of biomedical engineering, environment, industrial design, etc. The objective of the Conference is to bring together lectures, researchers and practitioners from different countries, working in the fields of computer simulation in information engineering, in order to exchange information and bring new contribution to this important field of engineering design and education. The Conference will bring you the latest ideas and development of the tools for computer simulation directly from their inventors. Contribution describ...

  18. On the hydraulic behaviour of ITER Shield Blocks #14 and #08. Computational analysis and comparison with experimental tests

    Energy Technology Data Exchange (ETDEWEB)

    Di Maio, P.A. [Dipartimento di Energia, Ingegneria dell’Informazione e Modelli Matematici, Università di Palermo Viale delle Scienze, 90128, Palermo (Italy); Merola, M.; Mitteau, R.; Raffray, R. [ITER Organization, Route de Vinon sur Verdon, 13067 Saint Paul, Lez Durance (France); Vallone, E., E-mail: eug.vallone@gmail.com [Dipartimento di Energia, Ingegneria dell’Informazione e Modelli Matematici, Università di Palermo Viale delle Scienze, 90128, Palermo (Italy)

    2016-11-01

    Highlights: • A benchmarking activity has been carried out focusing the attention on the cooling circuits of ITER Shield Blocks #08 and #14. • A theoretical-computational fluid-dynamic approach based on the Finite Volume Method has been followed, adopting a commercial code. • Hydraulic characteristic functions and spatial distributions of coolant mass flow rate, velocity and pressure drop have been assessed. • Results obtained have allowed code benchmarking for Blanket modules and the numerical predictions have been found to be generally lower than but quite close to the experimental results (lower than 10%). - Abstract: As a consequence of its position and functions, the ITER blanket system will be subjected to significant heat loads under nominal reference conditions. Therefore, the design of its cooling system is particularly demanding. Coolant water is distributed individually to the 440 blanket modules (BMs) through manifold piping, which makes it a highly parallelized system. The mass flow rate distribution is finely tuned to meet all operation constraints: adequate margin to burn out in the plasma facing components, even distribution of water flow among the so-called plasma-facing “fingers” of the Blanket First Wall panels, high enough water flow rate to avoid excessive water temperature in the outlet pipes, maximum allowable water velocity lower than 7 m/s in manifold pipes. Furthermore the overall pressure drop and flow rate in each BM shall be within the fixed specified design limit to avoid an unduly unbalance of cooling among the 440 modules. Analyses have to be carried out following a computational fluid-dynamic (CFD) approach based on the finite volume method and adopting a CFD commercial code to assess the thermal-hydraulic behaviour of each single circuit of the ITER blanket cooling system. This paper describes the code benchmarking needed to determine the best method to get reliable and timely results. Since experimental tests are

  19. Information Literacy Assessment: Moving beyond Computer Literacy

    Science.gov (United States)

    Hignite, Michael; Margavio, Thomas M.; Margavio, Geanie W.

    2009-01-01

    Information literacy is a concept that has evolved as a result of recent efforts to move technology-based instruction and research to a level above the long-held concepts previously associated with "computer literacy"; the focus of information literacy education being the development of students' abilities to construct/collect and…

  20. Computing, Information and Communications Technology (CICT) Website

    Science.gov (United States)

    Hardman, John; Tu, Eugene (Technical Monitor)

    2002-01-01

    The Computing, Information and Communications Technology Program (CICT) was established in 2001 to ensure NASA's Continuing leadership in emerging technologies. It is a coordinated, Agency-wide effort to develop and deploy key enabling technologies for a broad range of mission-critical tasks. The NASA CICT program is designed to address Agency-specific computing, information, and communications technology requirements beyond the projected capabilities of commercially available solutions. The areas of technical focus have been chosen for their impact on NASA's missions, their national importance, and the technical challenge they provide to the Program. In order to meet its objectives, the CICT Program is organized into the following four technology focused projects: 1) Computing, Networking and Information Systems (CNIS); 2) Intelligent Systems (IS); 3) Space Communications (SC); 4) Information Technology Strategic Research (ITSR).

  1. Cloud Computing and Information Technology Strategy

    Directory of Open Access Journals (Sweden)

    Antonio Mariano Carlos Junior

    2013-04-01

    Full Text Available Cloud computing represents a new paradigm that enables the utility computing model in which computing resources are offered and consumed as a service on demand, pay as you go, in a model similar to that of electricity. The objective of this work is to identify threats and opportunities of the cloud computing model and its influence on the strategy of companies that consume Information Technology. To do so, a survey was conducted with leading IT executives from 64 medium and large companies in Brazil. We noticed the influence of cloud computing in migrating the focus of the corporate IT departments to the management of services and contracts, resulting into the demand for professionals with IT analyst integrated and business profiles.

  2. Computing support for information-rich laparoscopy.

    Science.gov (United States)

    Seales, W Brent; Clarke, Duncan

    2005-12-01

    Developments in the architecture and organization of high-performance general-purpose computer systems are largely ignored by the technology infrastructure of the modern laparoscopic surgical suite. The current state of technology for laparoscopy is a camera and monitor linked via a controller that distributes analog or digital video signals without regard to their content. This article discusses the opportunities that will be created by inserting general-purpose high-performance computing into the information stream between camera and display. We envision that the use of this technology will radically transform laparoscopy from its current state as ;;surgery by pictures'' into an entirely new, information-rich surgical environment.

  3. Radiation shield

    Energy Technology Data Exchange (ETDEWEB)

    Nemezawa, Isao; Kimura, Tadahiro [Hitachi Ltd., Tokyo (Japan); Omori, Tetsu; Mizuochi, Akira

    1997-11-18

    A radiation shield is constituted by using a flexible bag made of a synthetic resin, a rubber plate or a composite member of them. Water is charged therein as a shielding liquid. Water injection ports are formed at the lower surface, and gas exhaustion ports are formed on the upper surface of the radiation shield. A plurality of vertical ribs made of the same material as the bag of the radiation shield are formed, integral with the bag, each at a space on the outer surface of the radiation shield. A reinforcing tube are inserted to the vertical ribs integral with the bag. The reinforcing tube may be made of an metal or non-metal material, but material having a bending strength greater than that of the bag is used. When wide surfaces are constituted in the horizontal direction as radiation shielding surfaces, a plurality of the radiation shields are used being in adjacent in the horizontal direction. The reinforcing tubes in adjacent with each other among the adjacent radiation shields are connected by connectors. (I.N.)

  4. Soft Computing in Construction Information Technology

    NARCIS (Netherlands)

    Ciftcioglu, O.; Durmisevic, S.; Sariyildiz, S.

    2001-01-01

    The last decade, civil engineering has exercised a rapidly growing interest in the application of neurally inspired computing techniques. The motive for this interest was the promises of certain information processing characteristics, which are similar to some extend, to those of human brain. The

  5. Inductive Information Retrieval Using Parallel Distributed Computation.

    Science.gov (United States)

    Mozer, Michael C.

    This paper reports on an application of parallel models to the area of information retrieval and argues that massively parallel, distributed models of computation, called connectionist, or parallel distributed processing (PDP) models, offer a new approach to the representation and manipulation of knowledge. Although this document focuses on…

  6. Computer and Information Sciences II : 26th International Symposium on Computer and Information Sciences

    CERN Document Server

    Lent, Ricardo; Sakellari, Georgia

    2012-01-01

    Information technology is the enabling foundation for all of human activity at the beginning of the 21st century, and advances in this area are crucial to all of us. These advances are taking place all over the world and can only be followed and perceived when researchers from all over the world assemble, and exchange their ideas in conferences such as the one presented in this proceedings volume regarding the 26th International Symposium on Computer and Information Systems, held at the Royal Society in London on 26th to 28th September 2011. Computer and Information Sciences II contains novel advances in the state of the art covering applied research in electrical and computer engineering and computer science, across the broad area of information technology. It provides access to the main innovative activities in research across the world, and points to the results obtained recently by some of the most active teams in both Europe and Asia.

  7. Computer and Information Sciences III : 27th International Symposium on Computer and Information Sciences

    CERN Document Server

    Lent, Ricardo

    2013-01-01

    Information technology is the enabling foundation science and technology for all of human activity at the beginning of the 21st century, and advances in this area are crucial to all of us. These advances are taking place all over the world and can only be followed and perceived when researchers from all over the world assemble, and exchange their ideas in conferences such as the one presented in this proceedings volume regarding the 27th International Symposium on Computer and Information Systems, held at the Institut Henri Poincare' in Paris on October 3 and 4, 2012. Computer and Information Sciences III: 27th International Symposium on Computer and Information Sciences contains novel advances in the state of the art covering applied research in electrical and computer engineering and computer science, across the broad area of information technology. It provides access to the main innovative activities in research across the world, and points to the results obtained recently by some of the most active teams ...

  8. Elementary computation of radiation doses and shieldings for radiochemical laboratories; Calculo Elemental de dosis y blindajes para laboratorios radioquimicos

    Energy Technology Data Exchange (ETDEWEB)

    Jimeno de Osso, F.

    1971-07-01

    Simple procedures for the calculation of radiation exposition, half thickness, shield thickness, etc. are described and equations and graphs are included for those gamma-emitting radionuclides, that are more often used in radiochemical laboratories. Application is made of these procedures to three radionuclides, bromine-82, sodium-24 and cobalt-60 which cover a rather wl.de energy range; theoretical results are compared with those obtained from experimental measurements. (Author) 23 refs.

  9. Multimodal Information Presentation for High-Load Human Computer Interaction

    OpenAIRE

    Cao, Y

    2011-01-01

    This dissertation addresses multimodal information presentation in human computer interaction. Information presentation refers to the manner in which computer systems/interfaces present information to human users. More specifically, the focus of our work is not on which information to present, but on how to present it, such as which modalities to use, how to spatially distribute items, et cetera. The notion ``computer'' is not limited to personal computers in their various forms. It also incl...

  10. PREFACE: Quantum Information, Communication, Computation and Cryptography

    Science.gov (United States)

    Benatti, F.; Fannes, M.; Floreanini, R.; Petritis, D.

    2007-07-01

    The application of quantum mechanics to information related fields such as communication, computation and cryptography is a fast growing line of research that has been witnessing an outburst of theoretical and experimental results, with possible practical applications. On the one hand, quantum cryptography with its impact on secrecy of transmission is having its first important actual implementations; on the other hand, the recent advances in quantum optics, ion trapping, BEC manipulation, spin and quantum dot technologies allow us to put to direct test a great deal of theoretical ideas and results. These achievements have stimulated a reborn interest in various aspects of quantum mechanics, creating a unique interplay between physics, both theoretical and experimental, mathematics, information theory and computer science. In view of all these developments, it appeared timely to organize a meeting where graduate students and young researchers could be exposed to the fundamentals of the theory, while senior experts could exchange their latest results. The activity was structured as a school followed by a workshop, and took place at The Abdus Salam International Center for Theoretical Physics (ICTP) and The International School for Advanced Studies (SISSA) in Trieste, Italy, from 12-23 June 2006. The meeting was part of the activity of the Joint European Master Curriculum Development Programme in Quantum Information, Communication, Cryptography and Computation, involving the Universities of Cergy-Pontoise (France), Chania (Greece), Leuven (Belgium), Rennes1 (France) and Trieste (Italy). This special issue of Journal of Physics A: Mathematical and Theoretical collects 22 contributions from well known experts who took part in the workshop. They summarize the present day status of the research in the manifold aspects of quantum information. The issue is opened by two review articles, the first by G Adesso and F Illuminati discussing entanglement in continuous variable

  11. Secure medical information sharing in cloud computing.

    Science.gov (United States)

    Shao, Zhiyi; Yang, Bo; Zhang, Wenzheng; Zhao, Yi; Wu, Zhenqiang; Miao, Meixia

    2015-01-01

    Medical information sharing is one of the most attractive applications of cloud computing, where searchable encryption is a fascinating solution for securely and conveniently sharing medical data among different medical organizers. However, almost all previous works are designed in symmetric key encryption environment. The only works in public key encryption do not support keyword trapdoor security, have long ciphertext related to the number of receivers, do not support receiver revocation without re-encrypting, and do not preserve the membership of receivers. In this paper, we propose a searchable encryption supporting multiple receivers for medical information sharing based on bilinear maps in public key encryption environment. In the proposed protocol, data owner stores only one copy of his encrypted file and its corresponding encrypted keywords on cloud for multiple designated receivers. The keyword ciphertext is significantly shorter and its length is constant without relation to the number of designated receivers, i.e., for n receivers the ciphertext length is only twice the element length in the group. Only the owner knows that with whom his data is shared, and the access to his data is still under control after having been put on the cloud. We formally prove the security of keyword ciphertext based on the intractability of Bilinear Diffie-Hellman problem and the keyword trapdoor based on Decisional Diffie-Hellman problem.

  12. Network selection, Information filtering and Scalable computation

    Science.gov (United States)

    Ye, Changqing

    This dissertation explores two application scenarios of sparsity pursuit method on large scale data sets. The first scenario is classification and regression in analyzing high dimensional structured data, where predictors corresponds to nodes of a given directed graph. This arises in, for instance, identification of disease genes for the Parkinson's diseases from a network of candidate genes. In such a situation, directed graph describes dependencies among the genes, where direction of edges represent certain causal effects. Key to high-dimensional structured classification and regression is how to utilize dependencies among predictors as specified by directions of the graph. In this dissertation, we develop a novel method that fully takes into account such dependencies formulated through certain nonlinear constraints. We apply the proposed method to two applications, feature selection in large margin binary classification and in linear regression. We implement the proposed method through difference convex programming for the cost function and constraints. Finally, theoretical and numerical analyses suggest that the proposed method achieves the desired objectives. An application to disease gene identification is presented. The second application scenario is personalized information filtering which extracts the information specifically relevant to a user, predicting his/her preference over a large number of items, based on the opinions of users who think alike or its content. This problem is cast into the framework of regression and classification, where we introduce novel partial latent models to integrate additional user-specific and content-specific predictors, for higher predictive accuracy. In particular, we factorize a user-over-item preference matrix into a product of two matrices, each representing a user's preference and an item preference by users. Then we propose a likelihood method to seek a sparsest latent factorization, from a class of over

  13. Multimodal Information Presentation for High-Load Human Computer Interaction

    NARCIS (Netherlands)

    Cao, Y.

    2011-01-01

    This dissertation addresses multimodal information presentation in human computer interaction. Information presentation refers to the manner in which computer systems/interfaces present information to human users. More specifically, the focus of our work is not on which information to present, but

  14. Analysis of Computer Network Information Based on "Big Data"

    Science.gov (United States)

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  15. Numerical Models for the Study of Electromagnetic Shielding

    Directory of Open Access Journals (Sweden)

    POPA Monica

    2012-10-01

    Full Text Available The paper presents 2D and 3D models for the study of electromagnetic shielding of a coil. The magnetic fields are computed for defining the shielding effectiveness. Parametrized numerical studies were performed in order to established the influence of shield thickness and height on magnetic field in certain points located in the exterior of coil – shield setup and on induced power within the shield.

  16. Patterns of students' computer use and relations to their computer and information literacy

    DEFF Research Database (Denmark)

    Bundsgaard, Jeppe; Gerick, Julia

    2017-01-01

    Background: Previous studies have shown that there is a complex relationship between students’ computer and information literacy (CIL) and their use of information and communication technologies (ICT) for both recreational and school use. Methods: This study seeks to dig deeper into these complex...... relations by identifying different patterns of students’ school-related and recreational computer use in the 21 countries participating in the International Computer and Information Literacy Study (ICILS 2013). Results: Latent class analysis (LCA) of the student questionnaire and performance data from......, raising important questions about differences in contexts. Keywords: ICILS, Computer use, Latent class analysis (LCA), Computer and information literacy....

  17. Can computational goals inform theories of vision?

    Science.gov (United States)

    Anderson, Barton L

    2015-04-01

    One of the most lasting contributions of Marr's posthumous book is his articulation of the different "levels of analysis" that are needed to understand vision. Although a variety of work has examined how these different levels are related, there is comparatively little examination of the assumptions on which his proposed levels rest, or the plausibility of the approach Marr articulated given those assumptions. Marr placed particular significance on computational level theory, which specifies the "goal" of a computation, its appropriateness for solving a particular problem, and the logic by which it can be carried out. The structure of computational level theory is inherently teleological: What the brain does is described in terms of its purpose. I argue that computational level theory, and the reverse-engineering approach it inspires, requires understanding the historical trajectory that gave rise to functional capacities that can be meaningfully attributed with some sense of purpose or goal, that is, a reconstruction of the fitness function on which natural selection acted in shaping our visual abilities. I argue that this reconstruction is required to distinguish abilities shaped by natural selection-"natural tasks" -from evolutionary "by-products" (spandrels, co-optations, and exaptations), rather than merely demonstrating that computational goals can be embedded in a Bayesian model that renders a particular behavior or process rational. Copyright © 2015 Cognitive Science Society, Inc.

  18. Human-Computer Interaction and Information Management Research Needs

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — In a visionary future, Human-Computer Interaction HCI and Information Management IM have the potential to enable humans to better manage their lives through the use...

  19. Low-Frequency EM Field Penetration Through Magnetic and Conducting Cylindrical Shields

    National Research Council Canada - National Science Library

    Morgan, Michael A

    2005-01-01

    .... Example field intensities and shielding are computed for a steel pipe at frequencies of 1 Hz and I kHz. The relative effectiveness of induced magnetic shielding and eddy-current shielding is considered.

  20. Information granularity, big data, and computational intelligence

    CERN Document Server

    Chen, Shyi-Ming

    2015-01-01

    The recent pursuits emerging in the realm of big data processing, interpretation, collection and organization have emerged in numerous sectors including business, industry, and government organizations. Data sets such as customer transactions for a mega-retailer, weather monitoring, intelligence gathering, quickly outpace the capacities of traditional techniques and tools of data analysis. The 3V (volume, variability and velocity) challenges led to the emergence of new techniques and tools in data visualization, acquisition, and serialization. Soft Computing being regarded as a plethora of technologies of fuzzy sets (or Granular Computing), neurocomputing and evolutionary optimization brings forward a number of unique features that might be instrumental to the development of concepts and algorithms to deal with big data. This carefully edited volume provides the reader with an updated, in-depth material on the emerging principles, conceptual underpinnings, algorithms and practice of Computational Intelligenc...

  1. Analytical Computation of Information Rate for MIMO Channels

    Directory of Open Access Journals (Sweden)

    Jinbao Zhang

    2017-01-01

    Full Text Available Information rate for discrete signaling constellations is significant. However, the computational complexity makes information rate rather difficult to analyze for arbitrary fading multiple-input multiple-output (MIMO channels. An analytical method is proposed to compute information rate, which is characterized by considerable accuracy, reasonable complexity, and concise representation. These features will improve accuracy for performance analysis with criterion of information rate.

  2. Fostering an Informal Learning Community of Computer Technologies at School

    Science.gov (United States)

    Xiao, Lu; Carroll, John M.

    2007-01-01

    Computer technologies develop at a challenging fast pace. Formal education should not only teach students basic computer skills to meet current computer needs, but also foster student development of informal learning ability for a lifelong learning process. On the other hand, students growing up in the digital world are often more skilled with…

  3. Advances in Computing and Information Technology : Proceedings of the Second International Conference on Advances in Computing and Information Technology

    CERN Document Server

    Nagamalai, Dhinaharan; Chaki, Nabendu

    2013-01-01

    The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, ...

  4. Computer a history of the information machine

    CERN Document Server

    Campbell-Kelly, Martin; Ensmenger, Nathan; Yost, Jeffrey R

    2013-01-01

    This history of the computer explores the roots of the industry's development, tracing not only the development of the machine itself--beginning with Charles Babbage's 1833 mechanical prototype--but also chronicling the effects of manufacturing and sales innovations by companies that made the boom possible.

  5. Applying Human Computation Methods to Information Science

    Science.gov (United States)

    Harris, Christopher Glenn

    2013-01-01

    Human Computation methods such as crowdsourcing and games with a purpose (GWAP) have each recently drawn considerable attention for their ability to synergize the strengths of people and technology to accomplish tasks that are challenging for either to do well alone. Despite this increased attention, much of this transformation has been focused on…

  6. Computers and Information Systems in Education.

    Science.gov (United States)

    Goodlad, John I.; And Others

    In an effort to increase the awareness of educators about the potential of electronic data processing (EDP) in education and acquaint the EDP specialists with current educational problems, this book discusses the routine uses of EDP for business and student accounting, as well as its innovative uses in instruction. A description of computers and…

  7. International Computer and Information Literacy Study: Assessment Framework

    Science.gov (United States)

    Fraillon, Julian; Schulz, Wolfram; Ainley, John

    2013-01-01

    The purpose of the International Computer and Information Literacy Study 2013 (ICILS 2013) is to investigate, in a range of countries, the ways in which young people are developing "computer and information literacy" (CIL) to support their capacity to participate in the digital age. To achieve this aim, the study will assess student…

  8. Computing, Information, and Communications Technology (CICT) Program Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The Computing, Information and Communications Technology (CICT) Program's goal is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communication technologies

  9. Entrepreneurial Health Informatics for Computer Science and Information Systems Students

    Science.gov (United States)

    Lawler, James; Joseph, Anthony; Narula, Stuti

    2014-01-01

    Corporate entrepreneurship is a critical area of curricula for computer science and information systems students. Few institutions of computer science and information systems have entrepreneurship in the curricula however. This paper presents entrepreneurial health informatics as a course in a concentration of Technology Entrepreneurship at a…

  10. For Information: 2004 CERN School of Computing

    CERN Multimedia

    IT Department

    2004-01-01

    29 August to 11 September 2004, Hotel Oriente, Vico Equense (Naples), Italy.  Organised by CERN in collaboration with the Institute of Composite and Biomedical Materials, National Research Council, Naples, Italy New this year: Grants from the European Union available to participants to cover part or all of the cost of the School. Programme highlights: GRID Technologies delivers unique theoretical and hands-on education on some of the most advanced GRID topics Software Technologies addresses the most relevant modern techniques and tools for large scale, distributed software development Physics Computing focuses on the particular challenges the HEP community is facing for the LHC computing Application now open - for details, see www.cern.ch/CSC">http://www.cern.ch/CSC>www.cern.ch/CSC

  11. Integrated computational and conceptual solutions for complex environmental information management

    Science.gov (United States)

    Rückemann, Claus-Peter

    2016-06-01

    This paper presents the recent results of the integration of computational and conceptual solutions for the complex case of environmental information management. The solution for the major goal of creating and developing long-term multi-disciplinary knowledge resources and conceptual and computational support was achieved by implementing and integrating key components. The key components are long-term knowledge resources providing required structures for universal knowledge creation, documentation, and preservation, universal multi-disciplinary and multi-lingual conceptual knowledge and classification, especially, references to Universal Decimal Classification (UDC), sustainable workflows for environmental information management, and computational support for dynamical use, processing, and advanced scientific computing with Integrated Information and Computing System (IICS) components and High End Computing (HEC) resources.

  12. Human Information Processing and Interactive Computing

    Science.gov (United States)

    1980-02-10

    Design--A Challenge to Human Factors," Conference on .a4n-Computer interaction, pp. 95-101. Asch , Solomon E. (1969), "A Reformulation of the Problem...included I,,i 47 association as a deacriptive term and as a statement of pro- existent verbal hierarchies. Finally, Asch (1969) emphasized the importance...of conceiving of an association in terms of the relation cf :•o events A and B. Asch suggests that the problem of associations is part of the general

  13. Quantum Computers: A New Paradigm in Information Technology

    Directory of Open Access Journals (Sweden)

    Mahesh S. Raisinghani

    2001-01-01

    Full Text Available The word 'quantum' comes from the Latin word quantus meaning 'how much'. Quantum computing is a fundamentally new mode of information processing that can be performed only by harnessing physical phenomena unique to quantum mechanics (especially quantum interference. Paul Benioff of the Argonne National Laboratory first applied quantum theory to computers in 1981 and David Deutsch of Oxford proposed quantum parallel computers in 1985, years before the realization of qubits in 1995. However, it may be well into the 21st century before we see quantum computing used at a commercial level for a variety of reasons discussed in this paper. The subject of quantum computing brings together ideas from classical information theory, computer science, and quantum physics. This paper discusses some of the current advances, applications, and chal-lenges of quantum computing as well as its impact on corporate computing and implications for management. It shows how quantum computing can be utilized to process and store information, as well as impact cryptography for perfectly secure communication, algorithmic searching, factorizing large numbers very rapidly, and simulating quantum-mechanical systems efficiently. A broad interdisciplinary effort will be needed if quantum com-puters are to fulfill their destiny as the world's fastest computing devices.

  14. The ORNL-SNAP shielding program

    Science.gov (United States)

    Mynatt, F. R.; Clifford, C. E.; Muckenthaler, F. J.; Gritzner, M. L.

    1972-01-01

    The effort in the ORNL-SNAP shielding program is directed toward the development and verification of computer codes using numerical solutions to the transport equation for the design of optimized radiation shields for SNAP power systems. A brief discussion is given for the major areas of the SNAP shielding program, which are cross-section development, transport code development, and integral experiments. Detailed results are presented for the integral experiments utilizing the TSF-SNAP reactor. Calculated results are compared with experiments for neutron and gamma-ray spectra from the bare reactor and as transmitted through slab shields.

  15. Radiation shielding member

    Energy Technology Data Exchange (ETDEWEB)

    Kasai, Tsutomu

    1998-03-17

    An iron box having optional width, depth and height with no back board is secured to the outer surface of an iron shielding member formed by laminating optional number of iron plates having an optional thickness. Optional number of structural walls acting also as partition walls and comprising a synthetic resin and having a neutron shielding function of a predetermined thickness is disposed between the front plate and the back face of the iron box. Pellets made of a synthetic resin having a radiation shielding function are filled in the iron box. As the synthetic resin having a neutron ray shielding function, a polyethylene resin is preferably used. The radiation shielding member thus constituted is used for a radiation shielding door. Radiation rays irradiated from a chamber are shielded except for neutron rays by the iron shielding member. Neutron rays permeate the iron shielding member, and are shielded by the layers of polyethylene pellets filled in the iron box. (I.N.)

  16. Quantum information and computation for chemistry

    CERN Document Server

    Kais, Sabre; Rice, Stuart A

    2014-01-01

    Examines the intersection of quantum information and chemical physics The Advances in Chemical Physics series is dedicated to reviewing new and emerging topics as well as the latest developments in traditional areas of study in the field of chemical physics. Each volume features detailed comprehensive analyses coupled with individual points of view that integrate the many disciplines of science that are needed for a full understanding of chemical physics. This volume of the series explores the latest research findings, applications, and new research paths from the quantum information science

  17. Computing Communities: Information Survivability via Adaptable Virtualization

    Science.gov (United States)

    2003-10-01

    Environment Internet Execution Environment Node 1 Intermediate Node Service Internet Driver Manager Event Manager Service Manager Class Manager...includes the following functional modules: class manager, plan manager, driver and service manager , event manager, and resource monitor. The class...responsible for replanning, in response to system conditions. The driver and service manager maintain information about deployed drivers and manage data

  18. FY 1999 Blue Book: Computing, Information, and Communications: Networked Computing for the 21st Century

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — U.S.research and development R and D in computing, communications, and information technologies has enabled unprecedented scientific and engineering advances,...

  19. 11th International Conference on Computer and Information Science

    CERN Document Server

    Computer and Information 2012

    2012-01-01

    The series "Studies in Computational Intelligence" (SCI) publishes new developments and advances in the various areas of computational intelligence – quickly and with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life science, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems, and hybrid intelligent systems. Critical to both contributors and readers are the short publication time and world-wide distribution - this permits a rapid and broad dissemination of research results.   The purpose of the 11th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2012...

  20. International Conference on Computer Science and Information Technologies

    CERN Document Server

    2017-01-01

    The book reports on new theories and applications in the field of intelligent systems and computing. It covers computational and artificial intelligence methods, as well as advances in computer vision, current issue in big data and cloud computing, computation linguistics, cyber-physical systems as well as topics in intelligent information management. Written by active researchers, the different chapters are based on contributions presented at the workshop in intelligent systems and computing (ISC), held during CSIT 2016, September 6-9, and jointly organized by the Lviv Polytechnic National University, Ukraine, the Kharkiv National University of RadioElectronics, Ukraine, and the Technical University of Lodz, Poland, under patronage of Ministry of Education and Science of Ukraine. All in all, the book provides academics and professionals with extensive information and a timely snapshot of the field of intelligent systems, and it is expected to foster new discussions and collaborations among different groups. ...

  1. Radiation shielding concrete made of Basalt aggregates.

    Science.gov (United States)

    Alhajali, S; Yousef, S; Kanbour, M; Naoum, B

    2013-04-01

    In spite of the fact that Basalt is a widespread type of rock, there is very little available information on using it as aggregates for concrete radiation shielding. This paper investigates the possibility of using Basalt for the aforementioned purpose. The results have shown that Basalt could be used successfully for preparing radiation shielding concrete, but some attention should be paid to the choice of the suitable types of Basalt and for the neutron activation problem that could arise in the concrete shield.

  2. Information visualization courses for students with a computer science background.

    Science.gov (United States)

    Kerren, Andreas

    2013-01-01

    Linnaeus University offers two master's courses in information visualization for computer science students with programming experience. This article briefly describes the syllabi, exercises, and practices developed for these courses.

  3. Availability and Use of Telecommunication/Computer Information ...

    African Journals Online (AJOL)

    buz_centr_03

    The study ascertained the availability and use of telecommunication/computer information and communication technologies ... system has been weakened and ineffective due to inadequate funding, ineffective motivation of agricultural researchers and ..... Fundamental of Agricultural Extension. Enugu: ABC Publishers.

  4. Information Security in the Age of Cloud Computing

    Science.gov (United States)

    Sims, J. Eric

    2012-01-01

    Information security has been a particularly hot topic since the enhanced internal control requirements of Sarbanes-Oxley (SOX) were introduced in 2002. At about this same time, cloud computing started its explosive growth. Outsourcing of mission-critical functions has always been a gamble for managers, but the advantages of cloud computing are…

  5. Quantum information processing in nanostructures Quantum optics; Quantum computing

    CERN Document Server

    Reina-Estupinan, J H

    2002-01-01

    Since information has been regarded os a physical entity, the field of quantum information theory has blossomed. This brings novel applications, such as quantum computation. This field has attracted the attention of numerous researchers with backgrounds ranging from computer science, mathematics and engineering, to the physical sciences. Thus, we now have an interdisciplinary field where great efforts are being made in order to build devices that should allow for the processing of information at a quantum level, and also in the understanding of the complex structure of some physical processes at a more basic level. This thesis is devoted to the theoretical study of structures at the nanometer-scale, 'nanostructures', through physical processes that mainly involve the solid-state and quantum optics, in order to propose reliable schemes for the processing of quantum information. Initially, the main results of quantum information theory and quantum computation are briefly reviewed. Next, the state-of-the-art of ...

  6. SHIELD-HIT12A - a Monte Carlo particle transport program for ion therapy research

    Science.gov (United States)

    Bassler, N.; Hansen, D. C.; Lühr, A.; Thomsen, B.; Petersen, J. B.; Sobolevsky, N.

    2014-03-01

    Purpose: The Monte Carlo (MC) code SHIELD-HIT simulates the transport of ions through matter. Since SHIELD-HIT08 we added numerous features that improves speed, usability and underlying physics and thereby the user experience. The "-A" fork of SHIELD-HIT also aims to attach SHIELD-HIT to a heavy ion dose optimization algorithm to provide MC-optimized treatment plans that include radiobiology. Methods: SHIELD-HIT12A is written in FORTRAN and carefully retains platform independence. A powerful scoring engine is implemented scoring relevant quantities such as dose and track-average LET. It supports native formats compatible with the heavy ion treatment planning system TRiP. Stopping power files follow ICRU standard and are generated using the libdEdx library, which allows the user to choose from a multitude of stopping power tables. Results: SHIELD-HIT12A runs on Linux and Windows platforms. We experienced that new users quickly learn to use SHIELD-HIT12A and setup new geometries. Contrary to previous versions of SHIELD-HIT, the 12A distribution comes along with easy-to-use example files and an English manual. A new implementation of Vavilov straggling resulted in a massive reduction of computation time. Scheduled for later release are CT import and photon-electron transport. Conclusions: SHIELD-HIT12A is an interesting alternative ion transport engine. Apart from being a flexible particle therapy research tool, it can also serve as a back end for a MC ion treatment planning system. More information about SHIELD-HIT12A and a demo version can be found on http://www.shieldhit.org.

  7. Innovations and Advances in Computer, Information, Systems Sciences, and Engineering

    CERN Document Server

    Sobh, Tarek

    2013-01-01

    Innovations and Advances in Computer, Information, Systems Sciences, and Engineering includes the proceedings of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2011). The contents of this book are a set of rigorously reviewed, world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of  Industrial Electronics, Technology and Automation, Telecommunications and Networking, Systems, Computing Sciences and Software Engineering, Engineering Education, Instructional Technology, Assessment, and E-learning.

  8. The 9th international conference on computing and information technology

    CERN Document Server

    Unger, Herwig; Boonkrong, Sirapat; IC2IT2013

    2013-01-01

    This volume contains the papers of the 9th International Conference on Computing and Information Technology (IC2IT 2013) held at King Mongkut's University of Technology North Bangkok (KMUTNB), Bangkok, Thailand, on May 9th-10th, 2013. Traditionally, the conference is organized in conjunction with the National Conference on Computing and Information Technology, one of the leading Thai national events in the area of Computer Science and Engineering. The conference as well as this volume is structured into 3 main tracks on Data Networks/Communication, Data Mining/Machine Learning, and Human Interfaces/Image processing.  

  9. 4th International Conference on Applied Computing and Information Technology

    CERN Document Server

    2017-01-01

    This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on December 12–14, 2016 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. The aim of this conference was also to bring out the research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the Program Committee, and underwent further rigorous rounds of review. Th...

  10. 30th International Symposium on Computer and Information Sciences

    CERN Document Server

    Gelenbe, Erol; Gorbil, Gokce; Lent, Ricardo

    2016-01-01

    The 30th Anniversary of the ISCIS (International Symposium on Computer and Information Sciences) series of conferences, started by Professor Erol Gelenbe at Bilkent University, Turkey, in 1986, will be held at Imperial College London on September 22-24, 2015. The preceding two ISCIS conferences were held in Krakow, Poland in 2014, and in Paris, France, in 2013.   The Proceedings of ISCIS 2015 published by Springer brings together rigorously reviewed contributions from leading international experts. It explores new areas of research and technological development in computer science, computer engineering, and information technology, and presents new applications in fast changing fields such as information science, computer science and bioinformatics.   The topics covered include (but are not limited to) advances in networking technologies, software defined networks, distributed systems and the cloud, security in the Internet of Things, sensor systems, and machine learning and large data sets.

  11. The Human-Computer Interface for Information Retrieval.

    Science.gov (United States)

    Shaw, Debora

    1991-01-01

    Discusses the human-computer interface as it relates to information technology and retrieval. Principles of interface design are examined, including visual display features and help messages; information retrieval applications are described, including online searching, CD-ROM, online public access catalogs (OPACs), and full-text databases; and…

  12. Splash, pop, sizzle: Information processing with phononic computing

    Directory of Open Access Journals (Sweden)

    Sophia R. Sklan

    2015-05-01

    Full Text Available Phonons, the quanta of mechanical vibration, are important to the transport of heat and sound in solid materials. Recent advances in the fundamental control of phonons (phononics have brought into prominence the potential role of phonons in information processing. In this review, the many directions of realizing phononic computing and information processing are examined. Given the relative similarity of vibrational transport at different length scales, the related fields of acoustic, phononic, and thermal information processing are all included, as are quantum and classical computer implementations. Connections are made between the fundamental questions in phonon transport and phononic control and the device level approach to diodes, transistors, memory, and logic.

  13. Cloud computing framework for a hydro information system

    OpenAIRE

    Delipetrev, Blagoj; Jonoski, Andreja; Solomatine, Dimitri

    2012-01-01

    The cloud computing framework of the hydro information system is based on three concepts that are closely related: cloud, service oriented architecture and web geographic information system. The architecture of the prototype hydro information system contains three tiers. The bottom tier is a distributed relational database (PostgreSQL, PostGIS) that store geospatial and other types of data. The middle tier is GeoServer web application that manages and presents geospatial maps and ...

  14. NEUTRONIC REACTOR SHIELD

    Science.gov (United States)

    Fermi, E.; Zinn, W.H.

    1957-09-24

    The reactor radiation shield material is comprised of alternate layers of iron-containing material and compressed cellulosic material, such as masonite. The shielding material may be prefabricated in the form of blocks, which can be stacked together in ary desired fashion to form an effective shield.

  15. 1st International Conference on Internet Computing and Information Communications

    CERN Document Server

    Awasthi, Lalit; Masillamani, M; Sridhar, S

    2014-01-01

    The book presents high quality research papers presented by experts in the International Conference on Internet Computing and Information Communications 2012, organized by ICICIC Global organizing committee (on behalf of The CARD Atlanta, Georgia, CREATE Conferences Inc). The objective of this book is to present the latest work done in the field of Internet computing by researchers and industrial professionals across the globe. A step to reduce the research divide between developed and under developed countries.

  16. PC based temporary shielding administrative procedure (TSAP)

    Energy Technology Data Exchange (ETDEWEB)

    Olsen, D.E.; Pederson, G.E. [Sargent & Lundy, Chicago, IL (United States); Hamby, P.N. [Commonwealth Edison Co., Downers Grove, IL (United States)

    1995-03-01

    A completely new Administrative Procedure for temporary shielding was developed for use at Commonwealth Edison`s six nuclear stations. This procedure promotes the use of shielding, and addresses industry requirements for the use and control of temporary shielding. The importance of an effective procedure has increased since more temporary shielding is being used as ALARA goals become more ambitious. To help implement the administrative procedure, a personal computer software program was written to incorporate the procedural requirements. This software incorporates the useability of a Windows graphical user interface with extensive help and database features. This combination of a comprehensive administrative procedure and user friendly software promotes the effective use and management of temporary shielding while ensuring that industry requirements are met.

  17. Green Computing in Local Governments and Information Technology Companies

    Directory of Open Access Journals (Sweden)

    Badar Agung Nugroho

    2013-06-01

    Full Text Available Green computing is a study and practice of designing, manufacturing, using, and disposing of information and communication devices efficiently and effectively with minimum impact on the environment. If the green computing concept was implemented, it will help the agencies or companies to reduce energy and capital cost from their IT infrastructure. The goal from this research is to explore the current condition about the efforts from local governments and IT companies at West Java to implement the green computing concept at their working environment. The primary data were collected by using focus group discussion by inviting the local governments and IT companies representatives who responsible to manage their IT infrastructure. And then, the secondary data were collected by doing brief observation in order to see the real effort of green computing implementation at each institution. The result shows that there are many different perspectives and efforts of green computing implementation between local governments and IT companies.

  18. Computational methods in reactor shielding

    National Research Council Canada - National Science Library

    Wood, J. I

    1982-01-01

    ... for adoption for class use and the recommendation results in a sale of 12 or more copies the inspection copy may be retained with our compliments. The Publishers will be pleased to receive suggestions for revised editions and new titles to be published in this important International Library.Other Pergamon Titles of Interest CAR...

  19. The Active Muon Shield

    CERN Document Server

    Bezshyiko, Iaroslava

    2016-01-01

    In the SHiP beam-dump of the order of 1011 muons will be produced per second. An active muon-shield is used to magnetically deflect these muons out of the acceptance of the spectrom- eter. This note describes how this shield is modelled and optimized. The SHiP spectrometer is being re-optimized using a conical decay-vessel, and utilizing the possibility to magnetize part of the beam-dump shielding iron. A shield adapted to these new conditions is presented which is significantly shorter and lighter than the shield used in the Technical Proposal (TP), while showing a similar performance.

  20. Computing and information sciences preliminary engineering design study

    Energy Technology Data Exchange (ETDEWEB)

    Schroeder, J O; Pearson, E W; Thomas, J J; Brothers, J W; Campbell, W K; DeVaney, D M; Jones, D R; Littlefield, R J; Peterson, M J

    1991-04-01

    This document presents the preliminary design concept for the integrated computing and information system to be included in the Environmental and Molecular Sciences Laboratory (EMSL) at the Pacific Northwest Laboratory, Richland, Washington, for the US Department of Energy (DOE). The EMSL is scheduled for completion and occupancy in 1994 or 1995 and will support the DOE environmental mission, in particular hazardous waste remediation. The focus of the report is on the Computing and Information Sciences engineering task of providing a fully integrated state-of-the-art computing environment for simulation, experimentation and analysis in support of molecular research. The EMSL will house two major research organizations, the Molecular Sciences Research Center (MSRC) and part of the Environmental Sciences Research Center (ESRC). Included in the report is a preliminary description of the computing and information system to be included. The proposed system architecture is based on a preliminary understanding of the EMSL users' needs for computational resources. As users understand more about the scientific challenges they face, the definition of the functional requirements will change. At the same time, the engineering team will be gaining experience with new computing technologies. Accordingly, the design architecture must evolve to reflect this new understanding of functional requirements and enabling technologies. 3 figs., 2 tabs.

  1. Fault-tolerant search algorithms reliable computation with unreliable information

    CERN Document Server

    Cicalese, Ferdinando

    2013-01-01

    Why a book on fault-tolerant search algorithms? Searching is one of the fundamental problems in computer science. Time and again algorithmic and combinatorial issues originally studied in the context of search find application in the most diverse areas of computer science and discrete mathematics. On the other hand, fault-tolerance is a necessary ingredient of computing. Due to their inherent complexity, information systems are naturally prone to errors, which may appear at any level - as imprecisions in the data, bugs in the software, or transient or permanent hardware failures. This book pr

  2. NMR chemical shift data and ab initio shielding calculations : emerging tools for protein structure determination

    NARCIS (Netherlands)

    Mulder, Frans A. A.; Filatov, Michael

    2010-01-01

    In this tutorial review, we discuss the utilization of chemical shift information as well as ab initio calculations of nuclear shieldings for protein structure determination. Both the empirical and computational aspects of the chemical shift are reviewed and the role of molecular dynamics and the

  3. Human-computer interaction and management information systems

    CERN Document Server

    Galletta, Dennis F

    2014-01-01

    ""Human-Computer Interaction and Management Information Systems: Applications"" offers state-of-the-art research by a distinguished set of authors who span the MIS and HCI fields. The original chapters provide authoritative commentaries and in-depth descriptions of research programs that will guide 21st century scholars, graduate students, and industry professionals. Human-Computer Interaction (or Human Factors) in MIS is concerned with the ways humans interact with information, technologies, and tasks, especially in business, managerial, organizational, and cultural contexts. It is distinctiv

  4. INFORMATION DISPLAY: CONSIDERATIONS FOR DESIGNING COMPUTER-BASED DISPLAY SYSTEMS.

    Energy Technology Data Exchange (ETDEWEB)

    O' HARA,J.M.; PIRUS,D.; BELTRATCCHI,L.

    2004-09-19

    This paper discussed the presentation of information in computer-based control rooms. Issues associated with the typical displays currently in use are discussed. It is concluded that these displays should be augmented with new displays designed to better meet the information needs of plant personnel and to minimize the need for interface management tasks (the activities personnel have to do to access and organize the information they need). Several approaches to information design are discussed, specifically addressing: (1) monitoring, detection, and situation assessment; (2) routine task performance; and (3) teamwork, crew coordination, collaborative work.

  5. Computational information geometry for image and signal processing

    CERN Document Server

    Critchley, Frank; Dodson, Christopher

    2017-01-01

    This book focuses on the application and development of information geometric methods in the analysis, classification and retrieval of images and signals. It provides introductory chapters to help those new to information geometry and applies the theory to several applications. This area has developed rapidly over recent years, propelled by the major theoretical developments in information geometry, efficient data and image acquisition and the desire to process and interpret large databases of digital information. The book addresses both the transfer of methodology to practitioners involved in database analysis and in its efficient computational implementation.

  6. 76 FR 20051 - Advisory Committee for Computer and Information; Science and Engineering; Notice of Meeting

    Science.gov (United States)

    2011-04-11

    ... Advisory Committee for Computer and Information; Science and Engineering; Notice of Meeting In accordance... announces the following meeting: ] Name: Advisory Committee for Computer and Information Science and..., Directorate for Computer and Information, Science and Engineering, National Science Foundation, 4201 Wilson...

  7. 77 FR 24538 - Advisory Committee for Computer and Information Science And Engineering; Notice of Meeting

    Science.gov (United States)

    2012-04-24

    ... FOUNDATION Advisory Committee for Computer and Information Science And Engineering; Notice of Meeting In... Foundation announces the following meeting: Name: Advisory Committee for Computer and Information Science and...: Carmen Whitson, Directorate for Computer and Information Science and Engineering, National Science...

  8. Computing, information, and communications: Technologies for the 21. Century

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-01

    To meet the challenges of a radically new and technologically demanding century, the Federal Computing, Information, and Communications (CIC) programs are investing in long-term research and development (R and D) to advance computing, information, and communications in the United States. CIC R and D programs help Federal departments and agencies to fulfill their evolving missions, assure the long-term national security, better understand and manage the physical environment, improve health care, help improve the teaching of children, provide tools for lifelong training and distance learning to the workforce, and sustain critical US economic competitiveness. One of the nine committees of the National Science and Technology Council (NSTC), the Committee on Computing, Information, and Communications (CCIC)--through its CIC R and D Subcommittee--coordinates R and D programs conducted by twelve Federal departments and agencies in cooperation with US academia and industry. These R and D programs are organized into five Program Component Areas: (1) HECC--High End Computing and Computation; (2) LSN--Large Scale Networking, including the Next Generation Internet Initiative; (3) HCS--High Confidence Systems; (4) HuCS--Human Centered Systems; and (5) ETHR--Education, Training, and Human Resources. A brief synopsis of FY 1997 accomplishments and FY 1998 goals by PCA is presented. This report, which supplements the President`s Fiscal Year 1998 Budget, describes the interagency CIC programs.

  9. "Glitch Logic" and Applications to Computing and Information Security

    Science.gov (United States)

    Stoica, Adrian; Katkoori, Srinivas

    2009-01-01

    This paper introduces a new method of information processing in digital systems, and discusses its potential benefits to computing and information security. The new method exploits glitches caused by delays in logic circuits for carrying and processing information. Glitch processing is hidden to conventional logic analyses and undetectable by traditional reverse engineering techniques. It enables the creation of new logic design methods that allow for an additional controllable "glitch logic" processing layer embedded into a conventional synchronous digital circuits as a hidden/covert information flow channel. The combination of synchronous logic with specific glitch logic design acting as an additional computing channel reduces the number of equivalent logic designs resulting from synthesis, thus implicitly reducing the possibility of modification and/or tampering with the design. The hidden information channel produced by the glitch logic can be used: 1) for covert computing/communication, 2) to prevent reverse engineering, tampering, and alteration of design, and 3) to act as a channel for information infiltration/exfiltration and propagation of viruses/spyware/Trojan horses.

  10. 10th International Conference on Computing and Information Technology

    CERN Document Server

    Unger, Herwig; Meesad, Phayung

    2014-01-01

    Computer and Information Technology (CIT) are now involved in governmental, industrial, and business domains more than ever. Thus, it is important for CIT personnel to continue academic research to improve technology and its adoption to modern applications. The up-to-date research and technologies must be distributed to researchers and CIT community continuously to aid future development. The 10th International Conference on Computing and Information Technology (IC 2 IT2014) organized by King Mongkut's University of Technology North Bangkok (KMUTNB) and partners provides an exchange of the state of the art and future developments in the two key areas of this process: Computer Networking and Data Mining. Behind the background of the foundation of ASEAN, it becomes clear that efficient languages, business principles and communication methods need to be adapted, unified and especially optimized to gain a maximum benefit to the users and customers of future IT systems.

  11. Design of the Information Science and Systems (IS Curriculum in a Computer and Information Sciences Department

    Directory of Open Access Journals (Sweden)

    Behrooz Seyed-Abbassi

    2004-12-01

    Full Text Available Continuous technological changes have resulted in a rapid turnover of knowledge in the computing field. The impact of these changes directly affects the computer-related curriculum offered by educational institutions and dictates that curriculum must evolve to keep pace with technology and to provide students with the skills required by businesses. At the same time, accreditations of curricula from reviewing organizations provide additional guidelines and standardization for computing science as well as information science programs. One of the areas significantly affected by these changes is the field of information systems. This paper describes the evaluation and course structure for the undergraduate information science and systems program in the Computer and Information Sciences Department at the University of North Florida. A list of the major required and elective courses as well as an overview of the challenges encountered during the revision of the curriculum is given.

  12. Interdisciplinarity and Computer Music Modeling and Information Retrieval

    DEFF Research Database (Denmark)

    Grund, Cynthia M.

    2006-01-01

    Abstract This paper takes a look at computer music modeling and information retrieval (CMMIR) from the point of view of the humanities with emphasis upon areas relevant to the philosophy of music. The desire for more interdisciplinary research involving CMMIR and the humanities is expressed...

  13. High Performance Computing and Communications: Toward a National Information Infrastructure.

    Science.gov (United States)

    Federal Coordinating Council for Science, Engineering and Technology, Washington, DC.

    This report describes the High Performance Computing and Communications (HPCC) initiative of the Federal Coordinating Council for Science, Engineering, and Technology. This program is supportive of and coordinated with the National Information Infrastructure Initiative. Now halfway through its 5-year effort, the HPCC program counts among its…

  14. The International Directory of Computer and Information System Services, 1971.

    Science.gov (United States)

    International Computation Centre--Intergovernmental Bureau for Informatics, Rome (Italy).

    The second edition of the directory presents information about the computer services provided to outside customers by commercial concerns, service bureaus, consultants, and educational and research establishments throughout the world. It lists the names, addresses, telephone numbers, and principal officers of institutions and companies, together…

  15. Academic Training Lecture Regular Programme: Computer Security - Introduction to information and computer security (1/4)

    CERN Multimedia

    2012-01-01

    Computer Security: Introduction to information and computer security (1/4), by Sebastian Lopienski (CERN).   Monday, 21 May, 2012 from 11:00 to 12:00 (Europe/Zurich) at CERN ( 31-3-004 - IT Auditorium ) Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Ai...

  16. Information-theoretic evaluation for computational biomedical ontologies

    CERN Document Server

    Clark, Wyatt Travis

    2014-01-01

    The development of effective methods for the prediction of ontological annotations is an important goal in computational biology, yet evaluating their performance is difficult due to problems caused by the structure of biomedical ontologies and incomplete annotations of genes. This work proposes an information-theoretic framework to evaluate the performance of computational protein function prediction. A Bayesian network is used, structured according to the underlying ontology, to model the prior probability of a protein's function. The concepts of misinformation and remaining uncertainty are

  17. International Conference on Computer Science and Information Technology

    CERN Document Server

    Li, Xiaolong

    2014-01-01

    The main objective of CSAIT 2013 is to provide a forum for researchers, educators, engineers and government officials involved in the general areas of Computational Sciences and Information Technology to disseminate their latest research results and exchange views on the future research directions of these fields. A medium like this provides an opportunity to the academicians and industrial professionals to exchange and integrate practice of computer science, application of the academic ideas, improve the academic depth. The in-depth discussions on the subject provide an international communication platform for educational technology and scientific research for the world's universities, engineering field experts, professionals and business executives.

  18. Mobile healthcare information management utilizing Cloud Computing and Android OS.

    Science.gov (United States)

    Doukas, Charalampos; Pliakas, Thomas; Maglogiannis, Ilias

    2010-01-01

    Cloud Computing provides functionality for managing information data in a distributed, ubiquitous and pervasive manner supporting several platforms, systems and applications. This work presents the implementation of a mobile system that enables electronic healthcare data storage, update and retrieval using Cloud Computing. The mobile application is developed using Google's Android operating system and provides management of patient health records and medical images (supporting DICOM format and JPEG2000 coding). The developed system has been evaluated using the Amazon's S3 cloud service. This article summarizes the implementation details and presents initial results of the system in practice.

  19. Using computer-based tests for information science

    Directory of Open Access Journals (Sweden)

    David Callear

    1997-12-01

    Full Text Available The introduction of objective testing using computer software does not necessarily represent innovative assessment. Where tests occur as an add-on to a course, are timeconstrained, closed-book, invigilated, and where there is little (or no feedback of results to the students, such testing is best regarded as an innovative technique for traditional summative assessment. A computer-based examination of this nature using the commercial software Question Mark has been operating for a number of years in the Department of Information Science at Portsmouth, in the second-year unit for Logic Programming, with student numbers up to 160.

  20. Reducing Computational Overhead of Network Coding with Intrinsic Information Conveying

    DEFF Research Database (Denmark)

    Heide, Janus; Zhang, Qi; Pedersen, Morten V.

    This paper investigated the possibility of intrinsic information conveying in network coding systems. The information is embedded into the coding vector by constructing the vector based on a set of predefined rules. This information can subsequently be retrieved by any receiver. The starting point...... is RLNC (Random Linear Network Coding) and the goal is to reduce the amount of coding operations both at the coding and decoding node, and at the same time remove the need for dedicated signaling messages. In a traditional RLNC system, coding operation takes up significant computational resources and adds...... to the overall energy consumption, which is particular problematic for mobile battery-driven devices. In RLNC coding is performed over a FF (Finite Field). We propose to divide this field into sub fields, and let each sub field signify some information or state. In order to embed the information correctly...

  1. A simplified computational memory model from information processing

    Science.gov (United States)

    Zhang, Lanhua; Zhang, Dongsheng; Deng, Yuqin; Ding, Xiaoqian; Wang, Yan; Tang, Yiyuan; Sun, Baoliang

    2016-01-01

    This paper is intended to propose a computational model for memory from the view of information processing. The model, called simplified memory information retrieval network (SMIRN), is a bi-modular hierarchical functional memory network by abstracting memory function and simulating memory information processing. At first meta-memory is defined to express the neuron or brain cortices based on the biology and graph theories, and we develop an intra-modular network with the modeling algorithm by mapping the node and edge, and then the bi-modular network is delineated with intra-modular and inter-modular. At last a polynomial retrieval algorithm is introduced. In this paper we simulate the memory phenomena and functions of memorization and strengthening by information processing algorithms. The theoretical analysis and the simulation results show that the model is in accordance with the memory phenomena from information processing view. PMID:27876847

  2. A spread willingness computing-based information dissemination model.

    Science.gov (United States)

    Huang, Haojing; Cui, Zhiming; Zhang, Shukui

    2014-01-01

    This paper constructs a kind of spread willingness computing based on information dissemination model for social network. The model takes into account the impact of node degree and dissemination mechanism, combined with the complex network theory and dynamics of infectious diseases, and further establishes the dynamical evolution equations. Equations characterize the evolutionary relationship between different types of nodes with time. The spread willingness computing contains three factors which have impact on user's spread behavior: strength of the relationship between the nodes, views identity, and frequency of contact. Simulation results show that different degrees of nodes show the same trend in the network, and even if the degree of node is very small, there is likelihood of a large area of information dissemination. The weaker the relationship between nodes, the higher probability of views selection and the higher the frequency of contact with information so that information spreads rapidly and leads to a wide range of dissemination. As the dissemination probability and immune probability change, the speed of information dissemination is also changing accordingly. The studies meet social networking features and can help to master the behavior of users and understand and analyze characteristics of information dissemination in social network.

  3. Health Information System in a Cloud Computing Context.

    Science.gov (United States)

    Sadoughi, Farahnaz; Erfannia, Leila

    2017-01-01

    Healthcare as a worldwide industry is experiencing a period of growth based on health information technology. The capabilities of cloud systems make it as an option to develop eHealth goals. The main objectives of the present study was to evaluate the advantages and limitations of health information systems implementation in a cloud-computing context that was conducted as a systematic review in 2016. Science direct, Scopus, Web of science, IEEE, PubMed and Google scholar were searched according study criteria. Among 308 articles initially found, 21 articles were entered in the final analysis. All the studies had considered cloud computing as a positive tool to help advance health technology, but none had insisted too much on its limitations and threats. Electronic health record systems have been mostly studied in the fields of implementation, designing, and presentation of models and prototypes. According to this research, the main advantages of cloud-based health information systems could be categorized into the following groups: economic benefits and advantages of information management. The main limitations of the implementation of cloud-based health information systems could be categorized into the 4 groups of security, legal, technical, and human restrictions. Compared to earlier studies, the present research had the advantage of dealing with the issue of health information systems in a cloud platform. The high frequency of studies conducted on the implementation of cloud-based health information systems revealed health industry interest in the application of this technology. Security was a subject discussed in most studies due to health information sensitivity. In this investigation, some mechanisms and solutions were discussed concerning the mentioned systems, which would provide a suitable area for future scientific research on this issue. The limitations and solutions discussed in this systematic study would help healthcare managers and decision

  4. Department of Energy: MICS (Mathematical Information, and Computational Sciences Division). High performance computing and communications program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-06-01

    This document is intended to serve two purposes. Its first purpose is that of a program status report of the considerable progress that the Department of Energy (DOE) has made since 1993, the time of the last such report (DOE/ER-0536, {open_quotes}The DOE Program in HPCC{close_quotes}), toward achieving the goals of the High Performance Computing and Communications (HPCC) Program. The second purpose is that of a summary report of the many research programs administered by the Mathematical, Information, and Computational Sciences (MICS) Division of the Office of Energy Research under the auspices of the HPCC Program and to provide, wherever relevant, easy access to pertinent information about MICS-Division activities via universal resource locators (URLs) on the World Wide Web (WWW). The information pointed to by the URL is updated frequently, and the interested reader is urged to access the WWW for the latest information.

  5. Problems and solutions in quantum computing and quantum information

    CERN Document Server

    Steeb, Willi-Hans

    2012-01-01

    Quantum computing and quantum information are two of the fastest growing and most exciting research fields in physics. Entanglement, teleportation and the possibility of using the non-local behavior of quantum mechanics to factor integers in random polynomial time have also added to this new interest. This book supplies a huge collection of problems in quantum computing and quantum information together with their detailed solutions, which will prove to be invaluable to students as well as researchers in these fields. All the important concepts and topics such as quantum gates and quantum circuits, product Hilbert spaces, entanglement and entanglement measures, deportation, Bell states, Bell inequality, Schmidt decomposition, quantum Fourier transform, magic gate, von Neumann entropy, quantum cryptography, quantum error corrections, number states and Bose operators, coherent states, squeezed states, Gaussian states, POVM measurement, quantum optics networks, beam splitter, phase shifter and Kerr Hamilton opera...

  6. Advances in Computer Science and Information Engineering Volume 2

    CERN Document Server

    Lin, Sally

    2012-01-01

    CSIE2012 is an integrated conference concentrating its focus on Computer Science and Information Engineering . In the proceeding, you can learn much more knowledge about Computer Science and Information Engineering of researchers from all around the world. The main role of the proceeding is to be used as an exchange pillar for researchers who are working in the mentioned fields. In order to meet the high quality of Springer, AISC series, the organization committee has made their efforts to do the following things. Firstly, poor quality paper has been refused after reviewing course by anonymous referee experts. Secondly, periodically review meetings have been held around the reviewers about five times for exchanging reviewing suggestions. Finally, the conference organizers had several preliminary sessions before the conference. Through efforts of different people and departments, the conference will be successful and fruitful.

  7. International Conference on Soft Computing in Information Communication Technology

    CERN Document Server

    Soft Computing in Information Communication Technology

    2012-01-01

      This is a collection of the accepted papers concerning soft computing in information communication technology. All accepted papers are subjected to strict peer-reviewing by 2 expert referees. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Neural Networks, Swarm Intelligence, Evolutionary Computing, Image Processing Internet Security, Data Security, Data Mining, Network Security and Protection of data and Cyber laws. Our sincere appreciation and thanks go to these authors for their contributions to this conference. I hope you can gain lots of useful information from the book.

  8. Advances in Computer Science and Information Engineering Volume 1

    CERN Document Server

    Lin, Sally

    2012-01-01

    CSIE2012 is an integrated conference concentrating its focus on Computer Science and Information Engineering . In the proceeding, you can learn much more knowledge about Computer Science and Information Engineering of researchers from all around the world. The main role of the proceeding is to be used as an exchange pillar for researchers who are working in the mentioned fields. In order to meet the high quality of Springer, AISC series, the organization committee has made their efforts to do the following things. Firstly, poor quality paper has been refused after reviewing course by anonymous referee experts. Secondly, periodically review meetings have been held around the reviewers about five times for exchanging reviewing suggestions. Finally, the conference organizers had several preliminary sessions before the conference. Through efforts of different people and departments, the conference will be successful and fruitful.

  9. Radiation shielding for future space exploration missions

    Science.gov (United States)

    DeWitt, Joel Michael

    Scope and Method of Study. The risk to space crew health and safety posed by exposure to space radiation is regarded as a significant obstacle to future human space exploration. To countermand this risk, engineers and designers in today's aerospace community will require detailed knowledge of a broad range of possible materials suitable for the construction of future spacecraft or planetary surface habitats that provide adequate protection from a harmful space radiation environment. This knowledge base can be supplied by developing an experimental method that provides quantitative information about a candidate material's space radiation shielding efficacy with the understanding that (1) shielding is currently the only practical countermeasure to mitigate the effects of space radiation on human interplanetary missions, (2) any mass of a spacecraft or planetary surface habitat necessarily alters the incident flux of ionizing radiation on it, and (3) the delivery of mass into LEO and beyond is expensive and therefore may benefit from the possible use of novel multifunctional materials that could in principle reduce cost as well as ionizing radiation exposure. The developed method has an experimental component using CR-39 PNTD and Al2O3:C OSLD that exposes candidate space radiation shielding materials of varying composition and depth to a representative sample of the GCR spectrum that includes 1 GeV 1H and 1 GeV/n 16O, 28Si, and 56Fe heavy ion beams at the BNL NSRL. The computer modeling component of the method used the Monte Carlo radiation transport code FLUKA to account for secondary neutrons that were not easily measured in the laboratory. Findings and Conclusions. This study developed a method that quantifies the efficacy of a candidate space radiation shielding material relative to the standard of polyethylene using a combination of experimental and computer modeling techniques. The study used established radiation dosimetry techniques to present an empirical

  10. Information Security Scheme Based on Computational Temporal Ghost Imaging.

    Science.gov (United States)

    Jiang, Shan; Wang, Yurong; Long, Tao; Meng, Xiangfeng; Yang, Xiulun; Shu, Rong; Sun, Baoqing

    2017-08-09

    An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.

  11. Quantum Computation and Information From Theory to Experiment

    CERN Document Server

    Imai, Hiroshi

    2006-01-01

    Recently, the field of quantum computation and information has been developing through a fusion of results from various research fields in theoretical and practical areas. This book consists of the reviews of selected topics charterized by great progress and cover the field from theoretical areas to experimental ones. It contains fundamental areas, quantum query complexity, quantum statistical inference, quantum cloning, quantum entanglement, additivity. It treats three types of quantum security system, quantum public key cryptography, quantum key distribution, and quantum steganography. A photonic system is highlighted for the realization of quantum information processing.

  12. Smart information systems computational intelligence for real-life applications

    CERN Document Server

    Hopfgartner, Frank

    2015-01-01

    This must-read text/reference presents an overview of smart information systems for both the private and public sector, highlighting the research questions that can be studied by applying computational intelligence. The book demonstrates how to transform raw data into effective smart information services, covering the challenges and potential of this approach. Each chapter describes the algorithms, tools, measures and evaluations used to answer important questions. This is then further illustrated by a diverse selection of case studies reflecting genuine problems faced by SMEs, multinational

  13. 12th International Conference on Computing and Information Technology

    CERN Document Server

    Boonkrong, Sirapat; Unger, Herwig

    2016-01-01

    This proceedings book presents recent research work and results in the area of communication and information technologies. The chapters of this book contain the main, well-selected and reviewed contributions of scientists who met at the 12th International Conference on Computing and Information Technology (IC2IT) held during 7th - 8th July 2016 in Khon Kaen, Thailand The book is divided into three parts: “User Centric Data Mining and Text Processing”, “Data Mining Algoritms and their Applications” and “Optimization of Complex Networks”.

  14. 11th International Conference on Computing and Information Technology

    CERN Document Server

    Meesad, Phayung; Boonkrong, Sirapat

    2015-01-01

    This book presents recent research work and results in the area of communication and information technologies. The book includes the main results of the 11th International Conference on Computing and Information Technology (IC2IT) held during July 2nd-3rd, 2015 in Bangkok, Thailand. The book is divided into the two main parts Data Mining and Machine Learning as well as Data Network and Communications. New algorithms and methods of data mining asr discussed as well as innovative applications and state-of-the-art technologies on data mining, machine learning and data networking.

  15. Signaling networks: information flow, computation, and decision making.

    Science.gov (United States)

    Azeloglu, Evren U; Iyengar, Ravi

    2015-04-01

    Signaling pathways come together to form networks that connect receptors to many different cellular machines. Such networks not only receive and transmit signals but also process information. The complexity of these networks requires the use of computational models to understand how information is processed and how input-output relationships are determined. Two major computational approaches used to study signaling networks are graph theory and dynamical modeling. Both approaches are useful; network analysis (application of graph theory) helps us understand how the signaling network is organized and what its information-processing capabilities are, whereas dynamical modeling helps us determine how the system changes in time and space upon receiving stimuli. Computational models have helped us identify a number of emergent properties that signaling networks possess. Such properties include ultrasensitivity, bistability, robustness, and noise-filtering capabilities. These properties endow cell-signaling networks with the ability to ignore small or transient signals and/or amplify signals to drive cellular machines that spawn numerous physiological functions associated with different cell states. Copyright © 2015 Cold Spring Harbor Laboratory Press; all rights reserved.

  16. The First NAFOSTED Conference on Information and Computer Science

    CERN Document Server

    Nguyen, Xuan; Le, Hoai; Nguyen, Viet; Bao, Vo

    2015-01-01

    This book includes the extended and revised versions of a set of selected papers from the First NAFOSTED Conference on Information and Computer Science (NICS’2014), held at Le Quy Don Technical Academy, Hanoi, Vietnam from 13/Mar./2014 to 14/Mar./2014. The conference was co-organized by The National Foundation for Science and Technology Development (NAFOSTED) and Le Quy Don Technical Academy. The purpose of the NICS conference series is to promote scientific publications in the country and to provide a platform for high quality academic exchange among scientists in the fields of computer science, information and communication. The conference includes five tracks, namely “Computer Science”, “Artificial Intelligence”, “Network Systems”, “Software Engineering”, and “Information Systems”.  The papers in this book are among the best contributions at NICS’2014 taken into account the quality of their presentation at the conference and the recommendation of the two experts in the extra round ...

  17. Cloud Computing in the Curricula of Schools of Computer Science and Information Systems

    Science.gov (United States)

    Lawler, James P.

    2011-01-01

    The cloud continues to be a developing area of information systems. Evangelistic literature in the practitioner field indicates benefit for business firms but disruption for technology departments of the firms. Though the cloud currently is immature in methodology, this study defines a model program by which computer science and information…

  18. TFCX shielding optimization

    Energy Technology Data Exchange (ETDEWEB)

    Yang, S.; Gohar, Y.

    1985-01-01

    Design analyses and tradeoff studies for the bulk shield of the Tokamak Fusion Core Experiment (TFCX) were performed. Several shielding options were considered to lower the capital cost of the shielding system. Optimization analyses were carried out to reduce the nuclear responses in the TF coils and the dose equivalent in the reactor hall one day after shutdown. Two TFCX designs with different toroidal field (TF) coil configurations were considered during this work. The materials for the shield were selected based upon tradeoff studies and the results from the previous design studies. The main shielding materials are water, concrete, and steel balls (Fe1422 or Nitronic 33). Small amounts of boron carbide and lead are employed to reduce activation, nuclear heating in the TF coils, and dose equivalent after shutdown.

  19. Justification of computational methods to ensure information management systems

    Directory of Open Access Journals (Sweden)

    E. D. Chertov

    2016-01-01

    Full Text Available Summary. Due to the diversity and complexity of organizational management tasks a large enterprise, the construction of an information management system requires the establishment of interconnected complexes of means, implementing the most efficient way collect, transfer, accumulation and processing of information necessary drivers handle different ranks in the governance process. The main trends of the construction of integrated logistics management information systems can be considered: the creation of integrated data processing systems by centralizing storage and processing of data arrays; organization of computer systems to realize the time-sharing; aggregate-block principle of the integrated logistics; Use a wide range of peripheral devices with the unification of information and hardware communication. Main attention is paid to the application of the system of research of complex technical support, in particular, the definition of quality criteria for the operation of technical complex, the development of information base analysis methods of management information systems and define the requirements for technical means, as well as methods of structural synthesis of the major subsystems of integrated logistics. Thus, the aim is to study on the basis of systematic approach of integrated logistics management information system and the development of a number of methods of analysis and synthesis of complex logistics that are suitable for use in the practice of engineering systems design. The objective function of the complex logistics management information systems is the task of gathering systems, transmission and processing of specified amounts of information in the regulated time intervals with the required degree of accuracy while minimizing the reduced costs for the establishment and operation of technical complex. Achieving the objective function of the complex logistics to carry out certain organization of interaction of information

  20. Hospital information systems: measuring end user computing satisfaction (EUCS).

    Science.gov (United States)

    Aggelidis, Vassilios P; Chatzoglou, Prodromos D

    2012-06-01

    Over the past decade, hospitals in Greece have made significant investments in adopting and implementing new hospital information systems (HISs). Whether these investments will prove beneficial for these organizations depends on the support that will be provided to ensure the effective use of the information systems implemented and also on the satisfaction of its users, which is one of the most important determinants of the success of these systems. Measuring end-user computing satisfaction has a long history within the IS discipline. A number of attempts have been made to evaluate the overall post hoc impact of HIS, focusing on the end-users and more specifically on their satisfaction and the parameters that determine it. The purpose of this paper is to build further upon the existing body of the relevant knowledge by testing past models and suggesting new conceptual perspectives on how end-user computing satisfaction (EUCS) is formed among hospital information system users. All models are empirically tested using data from hospital information system (HIS) users (283). Correlation, explanatory and confirmation factor analysis was performed to test the reliability and validity of the measurement models. The structural equation modeling technique was also used to evaluate the causal models. The empirical results of the study provide support for the EUCS model (incorporating new factors) and enhance the generalizability of the EUCS instrument and its robustness as a valid measure of computing satisfaction and a surrogate for system success in a variety of cultural and linguistic settings. Although the psychometric properties of EUCS appear to be robust across studies and user groups, it should not be considered as the final chapter in the validation and refinement of these scales. Continuing efforts should be made to validate and extend the instrument. Copyright © 2012 Elsevier Inc. All rights reserved.

  1. The Impact of Cloud Computing on Information Systems Agility

    Directory of Open Access Journals (Sweden)

    Mohamed Sawas

    2015-09-01

    Full Text Available As businesses are encountering frequent harsh economic conditions, concepts such as outsourcing, agile and lean management, change management and cost reduction are constantly gaining more attention. This is because these concepts are all aimed at saving on budgets and facing unexpected changes. Latest technologies like cloud computing promise to turn IT, that has always been viewed as a cost centre, into a source of saving money and driving flexibility and agility to the business. The purpose of this paper is to first compile a set of attributes that govern the agility benefits added to information systems by cloud computing and then develop a survey-based instrument to measure these agility benefits. Our research analysis employs non-probability sampling based on a combination of convenience and judgment. This approach was used to obtain a representative sample of participants from potential companies belonging to various industries such as oil & gas, banking, private, government and semi-governmental organizations. This research will enable decision makers to measure agility enhancements and hence compare the agility of Information Systems before and after deploying cloud computing.

  2. Modelling and simulation of information systems on computer: methodological advantages.

    Science.gov (United States)

    Huet, B; Martin, J

    1980-01-01

    Modelling and simulation of information systems by the means of miniatures on computer aim at two general objectives: (a) as an aid to design and realization of information systems; and (b) a tool to improve the dialogue between the designer and the users. An operational information system has two components bound by a dynamic relationship, an information system and a behavioural system. Thanks to the behaviour system, modelling and simulation allow the designer to integrate into the projects a large proportion of the system's implicit specification. The advantages of modelling to the information system relate to: (a) The conceptual phase: initial objectives are compared with the results of simulation and sometimes modified. (b) The external specifications: simulation is particularly useful for personalising man-machine relationships in each application. (c) The internal specifications: if the miniatures are built on the concept of process, the global design and the software are tested and also the simulation refines the configuration and directs the choice of hardware. (d) The implementation: stimulation reduces costs, time and allows testing. Progress in modelling techniques will undoubtedly lead to better information systems.

  3. Report of the Panel on Computer and Information Technology

    Science.gov (United States)

    Lundstrom, Stephen F.; Larsen, Ronald L.

    1984-01-01

    Aircraft have become more and more dependent on computers (information processing) for improved performance and safety. It is clear that this activity will grow, since information processing technology has advanced by a factor of 10 every 5 years for the past 35 years and will continue to do so. Breakthroughs in device technology, from vacuum tubes through transistors to integrated circuits, contribute to this rapid pace. This progress is nearly matched by similar, though not as dramatic, advances in numerical software and algorithms. Progress has not been easy. Many technical and nontechnical challenges were surmounted. The outlook is for continued growth in capability but will require surmounting new challenges. The technology forecast presented in this report has been developed by extrapolating current trends and assessing the possibilities of several high-risk research topics. In the process, critical problem areas that require research and development emphasis have been identified. The outlook assumes a positive perspective; the projected capabilities are possible by the year 2000, and adequate resources will be made available to achieve them. Computer and information technology forecasts and the potential impacts of this technology on aeronautics are identified. Critical issues and technical challenges underlying the achievement of forecasted performance and benefits are addressed.

  4. Computer Security: Introduction to information and computer security (1/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Aix-en-Provence and Haute Ecole de Gestion in Geneva in 2010. His professional interests include software and network security, distributed systems, and Web and mobile technologies. With the prevalence of modern information te...

  5. Shielding high energy accelerators

    CERN Document Server

    Stevenson, Graham Roger

    2001-01-01

    After introducing the subject of shielding high energy accelerators, point source, line-of-sight models, and in particular the Moyer model. are discussed. Their use in the shielding of proton and electron accelerators is demonstrated and their limitations noted. especially in relation to shielding in the forward direction provided by large, flat walls. The limitations of reducing problems to those using it cylindrical geometry description are stressed. Finally the use of different estimators for predicting dose is discussed. It is suggested that dose calculated from track-length estimators will generally give the most satisfactory estimate. (9 refs).

  6. Soft Computing in Information Communication Technology Volume 2

    CERN Document Server

    2012-01-01

    This book is a collection of the accepted papers concerning soft computing in information communication technology. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Fuzzy Logic, Machine Learning, Cryptography, Pattern Recognition, Bioinformatics, Biomedical Engineering, Advancements in ICT.

  7. Department of Energy Mathematical, Information, and Computational Sciences Division: High Performance Computing and Communications Program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-11-01

    This document is intended to serve two purposes. Its first purpose is that of a program status report of the considerable progress that the Department of Energy (DOE) has made since 1993, the time of the last such report (DOE/ER-0536, The DOE Program in HPCC), toward achieving the goals of the High Performance Computing and Communications (HPCC) Program. The second purpose is that of a summary report of the many research programs administered by the Mathematical, Information, and Computational Sciences (MICS) Division of the Office of Energy Research under the auspices of the HPCC Program and to provide, wherever relevant, easy access to pertinent information about MICS-Division activities via universal resource locators (URLs) on the World Wide Web (WWW).

  8. Representing spatial information in a computational model for network management

    Science.gov (United States)

    Blaisdell, James H.; Brownfield, Thomas F.

    1994-01-01

    While currently available relational database management systems (RDBMS) allow inclusion of spatial information in a data model, they lack tools for presenting this information in an easily comprehensible form. Computer-aided design (CAD) software packages provide adequate functions to produce drawings, but still require manual placement of symbols and features. This project has demonstrated a bridge between the data model of an RDBMS and the graphic display of a CAD system. It is shown that the CAD system can be used to control the selection of data with spatial components from the database and then quickly plot that data on a map display. It is shown that the CAD system can be used to extract data from a drawing and then control the insertion of that data into the database. These demonstrations were successful in a test environment that incorporated many features of known working environments, suggesting that the techniques developed could be adapted for practical use.

  9. Adhesive particle shielding

    Science.gov (United States)

    Klebanoff, Leonard Elliott [Dublin, CA; Rader, Daniel John [Albuquerque, NM; Walton, Christopher [Berkeley, CA; Folta, James [Livermore, CA

    2009-01-06

    An efficient device for capturing fast moving particles has an adhesive particle shield that includes (i) a mounting panel and (ii) a film that is attached to the mounting panel wherein the outer surface of the film has an adhesive coating disposed thereon to capture particles contacting the outer surface. The shield can be employed to maintain a substantially particle free environment such as in photolithographic systems having critical surfaces, such as wafers, masks, and optics and in the tools used to make these components, that are sensitive to particle contamination. The shield can be portable to be positioned in hard-to-reach areas of a photolithography machine. The adhesive particle shield can incorporate cooling means to attract particles via the thermophoresis effect.

  10. Grounding, shielding, and bonding

    Science.gov (United States)

    Catrysse, J.

    1991-06-01

    In the electromagnetic compatibility design (EMC) of systems and circuits, both grounding and shielding are related to the coupling mechanisms of the system with (radiated) electromagnetic fields. Grounding is more related to the source or victim circuit (or system) and determines the characteristic of the coupling mechanism between fields and currents/voltages. Shielding is a way of interacting in the radiation path of an electromagnetic field. The basic principles and practical design rules are discussed.

  11. Evaluation of Personal Shields Used in Selected Radiology Departments

    Directory of Open Access Journals (Sweden)

    Mohsen Salmanvandi

    2015-05-01

    Full Text Available Introduction The purpose of this study was to evaluate personal shields in radiation departments of hospitals affiliated to Mashhad University of Medical Sciences. Materials and Methods First, the information related to 109 personal shields was recorded and evaluated by imaging equipment. Afterwards, the equivalent lead thickness (ELT of 62 personal shields was assessed, using dosimeter and standard lead layers at 100 kVp. Results In this study, 109 personal shields were assessed in terms of tears, holes and cracks. The results showed that 18 shields were damaged. Moreover, ELT was evaluated in 62 shields. As the results indicated, ELT was unacceptable in 8 personal shields and lower than expected in 9 shields. Conclusion According to the results, 16.5% of personal shields had defects (tears, holes and cracks and 13% of them were unacceptable in terms of ELT and needed to be replaced. Therefore, regular quality control of personal shields and evaluation of new shields are necessary at any radiation department.

  12. Influence of Metal Fiber Content and Arrangement on Shielding Effectiveness for Blended Electromagnetic Shielding Fabric

    Directory of Open Access Journals (Sweden)

    Zhe Liu

    2015-06-01

    Full Text Available More metal fiber content of blended electromagnetic shielding (EMS fabric results in higher shielding effectiveness (SE of the fabric. However, there is little information about the influence of the metal fiber content on the SE considering the fabric structure. This study constructs an index of metal fiber content per unit area (MFCPUA, and discusses the influence of the metal fiber content on the SE of the EMS fabric when fabric parameters are changed. Computations for the MFCPUA and the thickness and porosity of the metal fiber arrangement are given, and then experiments are designed to test the SE of different EMS fabric samples. According to the experimental results, the influence of the MFCPUA on the SE is analyzed and influence mechanism is discussed when the fabric weaves, emission frequencies and weft and warp densities are changed. Results show that the MFCPUA and the SE are positive increase relation; the frequency and the SE are the negative increase relation when the metal fiber content is unchanged; the influence of the fabric weave type on the SE depends on the length of the yarn floats; the SE values of fabric with same weave are same when the MFCPUA is same regardless of the fabric density.DOI: http://dx.doi.org/10.5755/j01.ms.21.2.6529

  13. Towards GLUE 2: evolution of the computing element information model

    Science.gov (United States)

    Andreozzi, S.; Burke, S.; Field, L.; Kónya, B.

    2008-07-01

    A key advantage of Grid systems is the ability to share heterogeneous resources and services between traditional administrative and organizational domains. This ability enables virtual pools of resources to be created and assigned to groups of users. Resource awareness, the capability of users or user agents to have knowledge about the existence and state of resources, is required in order utilize the resource. This awareness requires a description of the services and resources typically defined via a community-agreed information model. One of the most popular information models, used by a number of Grid infrastructures, is the GLUE Schema, which provides a common language for describing Grid resources. Other approaches exist, however they follow different modeling strategies. The presence of different flavors of information models for Grid resources is a barrier for enabling inter-Grid interoperability. In order to solve this problem, the GLUE Working Group in the context of the Open Grid Forum was started. The purpose of the group is to oversee a major redesign of the GLUE Schema which should consider the successful modeling choices and flaws that have emerged from practical experience and modeling choices from other initiatives. In this paper, we present the status of the new model for describing computing resources as the first output from the working group with the aim of dissemination and soliciting feedback from the community.

  14. Information security: where computer science, economics and psychology meet.

    Science.gov (United States)

    Anderson, Ross; Moore, Tyler

    2009-07-13

    Until ca. 2000, information security was seen as a technological discipline, based on computer science but with mathematics helping in the design of ciphers and protocols. That perspective started to change as researchers and practitioners realized the importance of economics. As distributed systems are increasingly composed of machines that belong to principals with divergent interests, incentives are becoming as important to dependability as technical design. A thriving new field of information security economics provides valuable insights not just into 'security' topics such as privacy, bugs, spam and phishing, but into more general areas of system dependability and policy. This research programme has recently started to interact with psychology. One thread is in response to phishing, the most rapidly growing form of online crime, in which fraudsters trick people into giving their credentials to bogus websites; a second is through the increasing importance of security usability; and a third comes through the psychology-and-economics tradition. The promise of this multidisciplinary research programme is a novel framework for analysing information security problems-one that is both principled and effective.

  15. CADMIO: computer aided design for medical information objects.

    Science.gov (United States)

    Minarelli, D V; Ferri, F; Pisanelli, D M; Ricci, F L; Tittarelli, F

    1995-01-01

    The growth of the computational capability and the tools of graphic software is nowadays available in an integrated manner into the development environments, thus permitting the realization of tool kits capable of handling information that is complex and of different kinds such as the typical medical information. This has given a great impulse to the creation of electronic medical folders joining together with new and stimulating functionality with respect to the usual paper document [1]. In the present work, we propose a tool capable of defining a multimedia electronic medical folder and representing its architecture through a layout that is formed on the basis of the particular data types to be handled. This tool is capable of providing an integrated view of data that, even though they are close in cognitive sense, are often stored and represented apart in the practice. Different approaches to the browsing feature are giving within the system, thus the user can personalize the way of viewing the information stored into the folder or can let the system guide the browsing.

  16. 78 FR 79014 - Advisory Committee for Computer and Information Science and Engineering Notice of Meeting

    Science.gov (United States)

    2013-12-27

    ... From the Federal Register Online via the Government Publishing Office NATIONAL SCIENCE FOUNDATION Advisory Committee for Computer and Information Science and Engineering Notice of Meeting In accordance... announces the following meeting: NAME: Advisory Committee for Computer and Information Science and...

  17. Development of simplified methods and data bases for radiation shielding calculations for concrete

    Energy Technology Data Exchange (ETDEWEB)

    Bhuiyan, S.I.; Roussin, R.W.; Lucius, J.L.; Marable, J.H.; Bartine, D.A.

    1986-06-01

    Two simplified methods have been developed which allow rapid and accurate calculations of the attenuation of neutrons and gamma rays through concrete shields. One method, called the BEST method, uses sensitivity coefficients to predict changes in the transmitted dose from a fission source that are due to changes in the composition of the shield. The other method uses transmission factors based on adjoint calculations to predict the transmitted dose from an arbitrary source incident on a given shield. The BEST method, utilizing an exponential molecule that is shown to be a significant improvement over the traditional linear model, has been successfully applied to slab shields of standard concrete and rebar concrete. It has also been tested for a special concrete that has been used in many shielding experiments at the ORNL Tower Shielding Facility, as well as for a deep-penetration sodium problem. A comprehensive data base of concrete sensitivity coefficients generated as part of this study is available for use in the BEST model. For problems in which the changes are energy independent, application of the model and data base can be accomplished with a desk calculator. Larger-scale calculations required for problems that are energy dependent are facilitated by employing a simple computer code, which is included, together with the data base and other calculational aids, in a data package that can be obtained from the ORNL Radiation Shielding Information Center (request DLC-102/CONSENT). The transmission factors used by the second method are a byproduct of the sensitivity calculations and are mathematically equivalent to the surface adjoint function phi*, which gives the dose equivalent transmitted through a slab of thickness T due to one particle incident on the surface in the gth energy group and jth direction. 18 refs., 1 fig., 50 tabs.

  18. Advanced information processing system: Inter-computer communication services

    Science.gov (United States)

    Burkhardt, Laura; Masotto, Tom; Sims, J. Terry; Whittredge, Roy; Alger, Linda S.

    1991-01-01

    The purpose is to document the functional requirements and detailed specifications for the Inter-Computer Communications Services (ICCS) of the Advanced Information Processing System (AIPS). An introductory section is provided to outline the overall architecture and functional requirements of the AIPS and to present an overview of the ICCS. An overview of the AIPS architecture as well as a brief description of the AIPS software is given. The guarantees of the ICCS are provided, and the ICCS is described as a seven-layered International Standards Organization (ISO) Model. The ICCS functional requirements, functional design, and detailed specifications as well as each layer of the ICCS are also described. A summary of results and suggestions for future work are presented.

  19. A Cloud Computing Based Patient Centric Medical Information System

    Science.gov (United States)

    Agarwal, Ankur; Henehan, Nathan; Somashekarappa, Vivek; Pandya, A. S.; Kalva, Hari; Furht, Borko

    This chapter discusses an emerging concept of a cloud computing based Patient Centric Medical Information System framework that will allow various authorized users to securely access patient records from various Care Delivery Organizations (CDOs) such as hospitals, urgent care centers, doctors, laboratories, imaging centers among others, from any location. Such a system must seamlessly integrate all patient records including images such as CT-SCANS and MRI'S which can easily be accessed from any location and reviewed by any authorized user. In such a scenario the storage and transmission of medical records will have be conducted in a totally secure and safe environment with a very high standard of data integrity, protecting patient privacy and complying with all Health Insurance Portability and Accountability Act (HIPAA) regulations.

  20. [Informational approach to radiology department by end user computing].

    Science.gov (United States)

    Yamaguchi, Masaya; Katoh, Tsutomu; Murota, Makiko; Kohchi, Hideyuki; Miura, Shinji; Ishikawa, Midori; Ohhiro, Mika

    2009-04-20

    In recent years, due to the advanced computerization of medical institutions, systems such as radiology information system (RIS) and reporting have been used extensively also at radiology departments. However, the introduction of these systems will need a great amount of money, and the systems are not yet introduced in our hospital. On the contrary, thanks to the sophistication and price reduction of personal computers (PCs), there is now found a rapid expansion of end user computing (EUC) in which users of a system actively build and manage the system of their duties. Under these circumstances, in order to assist the duties at low costs, we worked the computerization of duties done at our Radiology Department by using the EUC. Specifically, we used software of general-purpose database to build the system with functions dealing with records on implementing medical examinations and treatments, examination booking and diagnostic imaging report. This system which has been developed according to details of conventional duties and requests from medical personnel makes it possible to alleviate the duties which were done manually.

  1. Geometric algebra and information geometry for quantum computational software

    Science.gov (United States)

    Cafaro, Carlo

    2017-03-01

    The art of quantum algorithm design is highly nontrivial. Grover's search algorithm constitutes a masterpiece of quantum computational software. In this article, we use methods of geometric algebra (GA) and information geometry (IG) to enhance the algebraic efficiency and the geometrical significance of the digital and analog representations of Grover's algorithm, respectively. Specifically, GA is used to describe the Grover iterate and the discretized iterative procedure that exploits quantum interference to amplify the probability amplitude of the target-state before measuring the query register. The transition from digital to analog descriptions occurs via Stone's theorem which relates the (unitary) Grover iterate to a suitable (Hermitian) Hamiltonian that controls Schrodinger's quantum mechanical evolution of a quantum state towards the target state. Once the discrete-to-continuos transition is completed, IG is used to interpret Grover's iterative procedure as a geodesic path on the manifold of the parametric density operators of pure quantum states constructed from the continuous approximation of the parametric quantum output state in Grover's algorithm. Finally, we discuss the dissipationless nature of quantum computing, recover the quadratic speedup relation, and identify the superfluity of the Walsh-Hadamard operation from an IG perspective with emphasis on statistical mechanical considerations.

  2. Photonic reservoir computing: a new approach to optical information processing

    Science.gov (United States)

    Vandoorne, Kristof; Fiers, Martin; Verstraeten, David; Schrauwen, Benjamin; Dambre, Joni; Bienstman, Peter

    2010-06-01

    Despite ever increasing computational power, recognition and classification problems remain challenging to solve. Recently, advances have been made by the introduction of the new concept of reservoir computing. This is a methodology coming from the field of machine learning and neural networks that has been successfully used in several pattern classification problems, like speech and image recognition. Thus far, most implementations have been in software, limiting their speed and power efficiency. Photonics could be an excellent platform for a hardware implementation of this concept because of its inherent parallelism and unique nonlinear behaviour. Moreover, a photonic implementation offers the promise of massively parallel information processing with low power and high speed. We propose using a network of coupled Semiconductor Optical Amplifiers (SOA) and show in simulation that it could be used as a reservoir by comparing it to conventional software implementations using a benchmark speech recognition task. In spite of the differences with classical reservoir models, the performance of our photonic reservoir is comparable to that of conventional implementations and sometimes slightly better. As our implementation uses coherent light for information processing, we find that phase tuning is crucial to obtain high performance. In parallel we investigate the use of a network of photonic crystal cavities. The coupled mode theory (CMT) is used to investigate these resonators. A new framework is designed to model networks of resonators and SOAs. The same network topologies are used, but feedback is added to control the internal dynamics of the system. By adjusting the readout weights of the network in a controlled manner, we can generate arbitrary periodic patterns.

  3. The International Computer and Information Literacy Study from a European Perspective: Introduction to the Special Issue

    Science.gov (United States)

    Gerick, Julia; Eickelmann, Birgit; Bos, Wilfried

    2017-01-01

    The "International Computer and Information Literacy Study" (ICILS 2013) provides, for the first time, information about students' computer and information literacy (CIL), as well as its acquisition, based on a computer-based test for students and background questionnaires. Among the 21 education systems that participated in ICILS 2013,…

  4. Computer Information Search and Retrieval: A Guide for the Music Educator.

    Science.gov (United States)

    Williams, David Brian; Beasley, L. Sue

    This report examines the features of computer information systems, differentiating between data files, search systems, and computer information organizations. An annotated listing is provided of those computer information retrieval files of interest to the music education researcher. This listing is divided into five categories: (1) music and…

  5. 77 FR 66873 - Advisory Committee for Computer and Information Science and Engineering; Notice of Meeting

    Science.gov (United States)

    2012-11-07

    ... Advisory Committee for Computer and Information Science and Engineering; Notice of Meeting In accordance... announces the following meeting: Name: Advisory Committee for Computer and Information Science and... impact of its policies, programs and activities on the Computer and Information Science and Engineering...

  6. 75 FR 19428 - Advisory Committee for Computer and Information Science and Engineering; Notice of Meeting

    Science.gov (United States)

    2010-04-14

    ... Advisory Committee for Computer and Information Science and Engineering; Notice of Meeting In accordance... announces the following meeting: Name: Advisory Committee for Computer and Information Science and... Cassandra Queen at the Directorate for Computer and Information Science and Engineering at 703/292-8900...

  7. 76 FR 61118 - Advisory Committee for Computer and Information Science and Engineering; Notice of Meeting

    Science.gov (United States)

    2011-10-03

    ... FOUNDATION Advisory Committee for Computer and Information Science and Engineering; Notice of Meeting In... Foundation announces the following meeting: Name: Advisory Committee for Computer and Information Science and.... Contact Person: Carmen Whitson, Directorate for Computer and Information Science and Engineering, National...

  8. A Study of the Programming Languages Used in Information Systems and in Computer Science Curricula

    Science.gov (United States)

    Russell, Jack; Russell, Barbara; Pollacia, Lissa F.; Tastle, William J.

    2010-01-01

    This paper researches the computer languages taught in the first, second and third programming courses in Computer Information Systems (CIS), Management Information Systems (MIS or IS) curricula as well as in Computer Science (CS) and Information Technology (IT) curricula. Instructors teaching the first course in programming within a four year…

  9. Cloud Computing and Information Technology Resource Cost Management for SMEs

    DEFF Research Database (Denmark)

    Kuada, Eric; Adanu, Kwame; Olesen, Henning

    2013-01-01

    This paper analyzes the decision-making problem confronting SMEs considering the adoption of cloud computing as an alternative to in-house computing services provision. The economics of choosing between in-house computing and a cloud alternative is analyzed by comparing the total economic costs...... in determining the relative value of cloud computing....

  10. Fog Computing to protect real and sensitivity information in Cloud

    OpenAIRE

    Thogaricheti Ashwini; Mrs. Anuradha.S.G

    2015-01-01

    Cloud computing can simply be described as computing based on the internet. In the past, people depended on physical computer storage or servers to run their programs. However, with the introduction of cloud computing, people as well as business enterprises can now access their programs through the internet. Due this ease, software companies and other agencies are shifting more towards cloud computing environment. To achieve better operational efficiency in many organizations and ...

  11. Quantum One Go Computation and the Physical Computation Level of Biological Information Processing

    Science.gov (United States)

    Castagnoli, Giuseppe

    2010-02-01

    By extending the representation of quantum algorithms to problem-solution interdependence, the unitary evolution part of the algorithm entangles the register containing the problem with the register containing the solution. Entanglement becomes correlation, or mutual causality, between the two measurement outcomes: the string of bits encoding the problem and that encoding the solution. In former work, we showed that this is equivalent to the algorithm knowing in advance 50% of the bits of the solution it will find in the future, which explains the quantum speed up. Mutual causality between bits of information is also equivalent to seeing quantum measurement as a many body interaction between the parts of a perfect classical machine whose normalized coordinates represent the qubit populations. This “hidden machine” represents the problem to be solved. The many body interaction (measurement) satisfies all the constraints of a nonlinear Boolean network “together and at the same time”—in one go—thus producing the solution. Quantum one go computation can formalize the physical computation level of the theories that place consciousness in quantum measurement. In fact, in visual perception, we see, thus recognize, thus process, a significant amount of information “together and at the same time”. Identifying the fundamental mechanism of consciousness with that of the quantum speed up gives quantum consciousness, with respect to classical consciousness, a potentially enormous evolutionary advantage.

  12. Electromagnetic Shielding Efficiency Measurement of Composite Materials

    Science.gov (United States)

    Dřínovský, J.; Kejík, Z.

    2009-01-01

    This paper deals with the theoretical and practical aspects of the shielding efficiency measurements of construction composite materials. This contribution describes an alternative test method of these measurements by using the measurement circular flange. The measured results and parameters of coaxial test flange are also discussed. The measurement circular flange is described by measured scattering parameters in the frequency range from 9 kHz up to 1 GHz. The accuracy of the used shielding efficiency measurement method was checked by brass calibration ring. The suitability of the coaxial test setup was also checked by measurements on the EMC test chamber. This data was compared with the measured data on the real EMC chamber. The whole measurement of shielding efficiency was controlled by the program which runs on a personal computer. This program was created in the VEE Pro environment produced by © Agilent Technology.

  13. Evolving the Land Information System into a Cloud Computing Service

    Energy Technology Data Exchange (ETDEWEB)

    Houser, Paul R. [CREW Services LLC, Ellicott City, MD (United States)

    2015-02-17

    The Land Information System (LIS) was developed to use advanced flexible land surface modeling and data assimilation frameworks to integrate extremely large satellite- and ground-based observations with advanced land surface models to produce continuous high-resolution fields of land surface states and fluxes. The resulting fields are extremely useful for drought and flood assessment, agricultural planning, disaster management, weather and climate forecasting, water resources assessment, and the like. We envisioned transforming the LIS modeling system into a scientific cloud computing-aware web and data service that would allow clients to easily setup and configure for use in addressing large water management issues. The focus of this Phase 1 project was to determine the scientific, technical, commercial merit and feasibility of the proposed LIS-cloud innovations that are currently barriers to broad LIS applicability. We (a) quantified the barriers to broad LIS utility and commercialization (high performance computing, big data, user interface, and licensing issues); (b) designed the proposed LIS-cloud web service, model-data interface, database services, and user interfaces; (c) constructed a prototype LIS user interface including abstractions for simulation control, visualization, and data interaction, (d) used the prototype to conduct a market analysis and survey to determine potential market size and competition, (e) identified LIS software licensing and copyright limitations and developed solutions, and (f) developed a business plan for development and marketing of the LIS-cloud innovation. While some significant feasibility issues were found in the LIS licensing, overall a high degree of LIS-cloud technical feasibility was found.

  14. Design of platform for removing screws from LCD display shields

    Science.gov (United States)

    Tu, Zimei; Qin, Qin; Dou, Jianfang; Zhu, Dongdong

    2017-11-01

    Removing the screws on the sides of a shield is a necessary process in disassembling a computer LCD display. To solve this issue, a platform has been designed for removing the screws on display shields. This platform uses virtual instrument technology with LabVIEW as the development environment to design the mechanical structure with the technologies of motion control, human-computer interaction and target recognition. This platform removes the screws from the sides of the shield of an LCD display mechanically thus to guarantee follow-up separation and recycle.

  15. Modular multiple sensors information management for computer-integrated surgery.

    Science.gov (United States)

    Vaccarella, Alberto; Enquobahrie, Andinet; Ferrigno, Giancarlo; Momi, Elena De

    2012-09-01

    In the past 20 years, technological advancements have modified the concept of modern operating rooms (ORs) with the introduction of computer-integrated surgery (CIS) systems, which promise to enhance the outcomes, safety and standardization of surgical procedures. With CIS, different types of sensor (mainly position-sensing devices, force sensors and intra-operative imaging devices) are widely used. Recently, the need for a combined use of different sensors raised issues related to synchronization and spatial consistency of data from different sources of information. In this study, we propose a centralized, multi-sensor management software architecture for a distributed CIS system, which addresses sensor information consistency in both space and time. The software was developed as a data server module in a client-server architecture, using two open-source software libraries: Image-Guided Surgery Toolkit (IGSTK) and OpenCV. The ROBOCAST project (FP7 ICT 215190), which aims at integrating robotic and navigation devices and technologies in order to improve the outcome of the surgical intervention, was used as the benchmark. An experimental protocol was designed in order to prove the feasibility of a centralized module for data acquisition and to test the application latency when dealing with optical and electromagnetic tracking systems and ultrasound (US) imaging devices. Our results show that a centralized approach is suitable for minimizing synchronization errors; latency in the client-server communication was estimated to be 2 ms (median value) for tracking systems and 40 ms (median value) for US images. The proposed centralized approach proved to be adequate for neurosurgery requirements. Latency introduced by the proposed architecture does not affect tracking system performance in terms of frame rate and limits US images frame rate at 25 fps, which is acceptable for providing visual feedback to the surgeon in the OR. Copyright © 2012 John Wiley & Sons, Ltd.

  16. Proceedings of ISCIS III, the third international symposium on computer and information sciences

    Energy Technology Data Exchange (ETDEWEB)

    Gelenbe, E.; Orhun, E.; Basar, E.

    1988-01-01

    The symposium presented in this book covered the following topics in computer and information sciences: computer networks, computers in education, software engineering, modelling and simulation, concurrency, artificial intelligence, image and signal processing, data base systems, operating systems, parallel processing, robotics, reliability, computer architecture, CAD/CAM, and social and technical applications. Many of the papers presented are studies on computer networks, computers in education, artificial intelligence, software engineering, concurrency, data base systems, image processing, and parallel processing.

  17. Electrostatic shielding of transformers

    Energy Technology Data Exchange (ETDEWEB)

    De Leon, Francisco

    2017-11-28

    Toroidal transformers are currently used only in low-voltage applications. There is no published experience for toroidal transformer design at distribution-level voltages. Toroidal transformers are provided with electrostatic shielding to make possible high voltage applications and withstand the impulse test.

  18. Shield For Flexible Pipe

    Science.gov (United States)

    Ponton, Michael K.; Williford, Clifford B.; Lagen, Nicholas T.

    1995-01-01

    Cylindrical shield designed to fit around flexible pipe to protect nearby workers from injury and equipment from damage if pipe ruptures. Designed as pressure-relief device. Absorbs impact of debris ejected radially from broken flexible pipe. Also redirects flow of pressurized fluid escaping from broken pipe onto flow path allowing for relief of pressure while minimizing potential for harm.

  19. Radiation dose reduction at a price: the effectiveness of a male gonadal shield during helical CT scans

    Directory of Open Access Journals (Sweden)

    Erdi Yusuf E

    2007-03-01

    Full Text Available Abstract Background It is estimated that 60 million computed tomography (CT scans were performed during 2006, with approximately 11% of those performed on children age 0–15 years. Various types of gonadal shielding have been evaluated for reducing exposure to the gonads. The purpose of this study was to quantify the radiation dose reduction to the gonads and its effect on image quality when a wrap-around male pediatric gonad shield was used during CT scanning. This information is obtained to assist the attending radiologist in the decision to utilize such male gonadal shields in pediatric imaging practice. Methods The dose reduction to the gonads was measured for both direct radiation and for indirect scattered radiation from the abdomen. A 6 cm3 ion chamber (Model 10X5-6, Radcal Corporation, Monrovia, CA was placed on a Humanoid real bone pelvic phantom at a position of the male gonads. When exposure measurements with shielding were made, a 1 mm lead wrap-around gonadal shield was placed around the ion chamber sensitive volume. Results The use of the shields reduced scatter dose to the gonads by a factor of about 2 with no appreciable loss of image quality. The shields reduced the direct beam dose by a factor of about 35 at the expense of extremely poor CT image quality due to severe streak artifacts. Conclusion Images in the direct exposure case are not useful due to these severe artifacts and the difficulties in positioning these shields on patients in the scatter exposure case may not be warranted by the small absolute reduction in scatter dose unless it is expected that the patient will be subjected to numerous future CT scans.

  20. Lightweight Shield Against Space Debris

    Science.gov (United States)

    Redmon, John W., Jr.; Lawson, Bobby E.; Miller, Andre E.; Cobb, W. E.

    1992-01-01

    Report presents concept for lightweight, deployable shield protecting orbiting spacecraft against meteoroids and debris, and functions as barrier to conductive and radiative losses of heat. Shield made in four segments providing 360 degree coverage of cylindrical space-station module.

  1. Dynamic rotating-shield brachytherapy

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Yunlong [Department of Electrical and Computer Engineering, University of Iowa, 4016 Seamans Center, Iowa City, Iowa 52242 (United States); Flynn, Ryan T.; Kim, Yusung [Department of Radiation Oncology, University of Iowa, 200 Hawkins Drive, Iowa City, Iowa 52242 (United States); Yang, Wenjun [Department of Medical Physics, University of Wisconsin-Madison, 1111 Highland Avenue, Madison, Wisconsin 53705 (United States); Wu, Xiaodong [Department of Electrical and Computer Engineering, University of Iowa, 4016 Seamans Center, Iowa City, Iowa 52242 and Department of Radiation Oncology, University of Iowa, 200 Hawkins Drive, Iowa City, Iowa 52242 (United States)

    2013-12-15

    Purpose: To present dynamic rotating shield brachytherapy (D-RSBT), a novel form of high-dose-rate brachytherapy (HDR-BT) with electronic brachytherapy source, where the radiation shield is capable of changing emission angles during the radiation delivery process.Methods: A D-RSBT system uses two layers of independently rotating tungsten alloy shields, each with a 180° azimuthal emission angle. The D-RSBT planning is separated into two stages: anchor plan optimization and optimal sequencing. In the anchor plan optimization, anchor plans are generated by maximizing the D{sub 90} for the high-risk clinical-tumor-volume (HR-CTV) assuming a fixed azimuthal emission angle of 11.25°. In the optimal sequencing, treatment plans that most closely approximate the anchor plans under the delivery-time constraint will be efficiently computed. Treatment plans for five cervical cancer patients were generated for D-RSBT, single-shield RSBT (S-RSBT), and {sup 192}Ir-based intracavitary brachytherapy with supplementary interstitial brachytherapy (IS + ICBT) assuming five treatment fractions. External beam radiotherapy doses of 45 Gy in 25 fractions of 1.8 Gy each were accounted for. The high-risk clinical target volume (HR-CTV) doses were escalated such that the D{sub 2cc} of the rectum, sigmoid colon, or bladder reached its tolerance equivalent dose in 2 Gy fractions (EQD2 with α/β= 3 Gy) of 75 Gy, 75 Gy, or 90 Gy, respectively.Results: For the patients considered, IS + ICBT had an average total dwell time of 5.7 minutes/fraction (min/fx) assuming a 10 Ci{sup 192}Ir source, and the average HR-CTV D{sub 90} was 78.9 Gy. In order to match the HR-CTV D{sub 90} of IS + ICBT, D-RSBT required an average of 10.1 min/fx more delivery time, and S-RSBT required 6.7 min/fx more. If an additional 20 min/fx of delivery time is allowed beyond that of the IS + ICBT case, D-RSBT and S-RSBT increased the HR-CTV D{sub 90} above IS + ICBT by an average of 16.3 Gy and 9.1 Gy, respectively

  2. WASTE HANDLING BUILDING SHIELD WALL ANALYSIS

    Energy Technology Data Exchange (ETDEWEB)

    D. Padula

    2000-01-13

    The scope of this analysis is to estimate the shielding wall, ceiling or equivalent door thicknesses that will be required in the Waste Handling Building to maintain the radiation doses to personnel within acceptable limits. The shielding thickness calculated is the minimum required to meet administrative limits, and not necessarily what will be recommended for the final design. The preliminary evaluations will identify the areas which have the greatest impact on mechanical and facility design concepts. The objective is to provide the design teams with the necessary information to assure an efficient and effective design.

  3. FY 1995 Blue Book: High Performance Computing and Communications: Technology for the National Information Infrastructure

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Federal High Performance Computing and Communications HPCC Program was created to accelerate the development of future generations of high performance computers...

  4. 76 FR 37111 - Access to Confidential Business Information by Computer Sciences Corporation and Its Identified...

    Science.gov (United States)

    2011-06-24

    ... From the Federal Register Online via the Government Publishing Office ENVIRONMENTAL PROTECTION AGENCY Access to Confidential Business Information by Computer Sciences Corporation and Its Identified... contractor, Computer Sciences Corporation of Chantilly, VA and Its Identified Subcontractors, to access...

  5. Neutron shielding for a {sup 252} Cf source

    Energy Technology Data Exchange (ETDEWEB)

    Vega C, H.R.; Manzanares A, E.; Hernandez D, V.M. [Unidades Academicas de Estudios Nucleares e Ingenieria Electrica, Universidad Autonoma de Zacatecas, C. Cipres 10, Fracc. La Penuela, 98068 Zacatecas (Mexico); Eduardo Gallego, Alfredo Lorente [Depto. de Ingenieria Nuclear, ETS Ingenieros Industriales, Universidad Politecnica de Madrid, C. Jose Gutierrez Abascal 2, 28006 Madrid (Spain)]. e-mail: fermineutron@yahoo.com

    2006-07-01

    To determine the neutron shielding features of water-extended polyester a Monte Carlo study was carried out. Materials with low atomic number are predominantly used for neutron shielding because these materials effectively attenuate neutrons, mainly through inelastic collisions and absorption reactions. During the selection of materials to design a neutron shield, prompt gamma production as well as radionuclide production induced by neutron activation must be considered. In this investigation the Monte Carlo method was used to evaluate the performance of a water-extended polyester shield designed for the transportation, storage, and use of a {sup 252}Cf isotopic neutron source. During calculations a detailed model for the {sup 252}Cf and the shield was utilized. To compare the shielding features of water extended polyester, the calculations were also made for the bare {sup 252}Cf in vacuum, air and the shield filled with water. For all cases the calculated neutron spectra was utilized to determine the ambient equivalent neutron dose at four sites around the shielding. In the case of water extended polyester and water shielding the calculations were extended to include the prompt gamma rays produced during neutron interactions, with this information the Kerma in air was calculated at the same locations where the ambient equivalent neutron dose was determined. (Author)

  6. Information Processing Models and Computer Aids for Human Performance.

    Science.gov (United States)

    Swets, John A.; And Others

    Progress is reported on four research tasks. An experiment tested the effectiveness of a computer-based phonology instructional system for second-language learning. In research on models of human-computer interactions, experiments were performed demonstrating that the provision of certain incentives to the users of a time-sharing system can have…

  7. Big data computing: Building a vision for ARS information management

    Science.gov (United States)

    Improvements are needed within the ARS to increase scientific capacity and keep pace with new developments in computer technologies that support data acquisition and analysis. Enhancements in computing power and IT infrastructure are needed to provide scientists better access to high performance com...

  8. Roof Shield for Advance and Retreat Mining

    Science.gov (United States)

    Lewis, E. V.

    1985-01-01

    Shield sections change their configuration to suit mining mode. Articulation cylinders raise rear shield to advance position, and locking cylinders hold it there. To change to retreat position articulation cylinders lower shield. Locking pins at edge of outermost shield plate latch shield to chock base. Shield accommodates roof heights ranging from 36 to 60 inches (0.9 to 1.52 meters).

  9. A computer-oriented system for assembling and displaying land management information

    Science.gov (United States)

    Elliot L. Amidon

    1964-01-01

    Maps contain information basic to land management planning. By transforming conventional map symbols into numbers which are punched into cards, the land manager can have a computer assemble and display information required for a specific job. He can let a computer select information from several maps, combine it with such nonmap data as treatment cost or benefit per...

  10. Light shielding apparatus

    Energy Technology Data Exchange (ETDEWEB)

    Miller, Richard Dean; Thom, Robert Anthony

    2017-10-10

    A light shielding apparatus for blocking light from reaching an electronic device, the light shielding apparatus including left and right support assemblies, a cross member, and an opaque shroud. The support assemblies each include primary support structure, a mounting element for removably connecting the apparatus to the electronic device, and a support member depending from the primary support structure for retaining the apparatus in an upright orientation. The cross member couples the left and right support assemblies together and spaces them apart according to the size and shape of the electronic device. The shroud may be removably and adjustably connectable to the left and right support assemblies and configured to take a cylindrical dome shape so as to form a central space covered from above. The opaque shroud prevents light from entering the central space and contacting sensitive elements of the electronic device.

  11. Computer information resources of inorganic chemistry and materials science

    Energy Technology Data Exchange (ETDEWEB)

    Kiselyova, N N; Dudarev, V A; Zemskov, V S [A.A.Baikov Institute of Metallurgy and Materials Science, Russian Academy of Sciences, Moscow (Russian Federation)

    2010-02-28

    Information systems used in inorganic chemistry and materials science are considered. The following basic trends in the development of modern information systems in these areas are highlighted: access to information via the Internet, merging of documental and factual databases, involvement of experts in the evaluation of the data reliability, supplementing databases with information analysis tools on the properties of inorganic substances and materials.

  12. Biotechnology Computing: Information Science for the Era of Molecular Medicine.

    Science.gov (United States)

    Masys, Daniel R.

    1989-01-01

    The evolution from classical genetics to biotechnology, an area of research involving key macromolecules in living cells, is chronicled and the current state of biotechnology is described, noting related advances in computing and clinical medicine. (MSE)

  13. Advances in Computing and Information Technology : Proceedings of the Second International

    CERN Document Server

    Nagamalai, Dhinaharan; Chaki, Nabendu

    2012-01-01

    The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, ...

  14. CLOUD COMPUTING BASED INFORMATION SYSTEMS -PRESENT AND FUTURE

    Directory of Open Access Journals (Sweden)

    Maximilian ROBU

    2012-12-01

    Full Text Available The current economic crisis and the global recession have affected the IT market as well. A solution camefrom the Cloud Computing area by optimizing IT budgets and eliminating different types of expenses (servers, licenses,and so on. Cloud Computing is an exciting and interesting phenomenon, because of its relative novelty and explodinggrowth. Because of its raise in popularity and usage Cloud Computing has established its role as a research topic.However the tendency is to focus on the technical aspects of Cloud Computing, thus leaving the potential that thistechnology offers unexplored. With the help of this technology new market player arise and they manage to break thetraditional value chain of service provision. The main focus of this paper is the business aspects of Cloud. In particularwe will talk about the economic aspects that cover using Cloud Computing (when, why and how to use, and theimpacts on the infrastructure, the legalistic issues that come from using Cloud Computing; the scalability and partiallyunclear legislation.

  15. Paper, Piles, and Computer Files: Folklore of Information Work Environments.

    Science.gov (United States)

    Neumann, Laura J.

    1999-01-01

    Reviews literature to form a folklore of information workspace and emphasizes the importance of studying folklore of information work environments in the context of the current shift toward removing work from any particular place via information systems, e-mail, and the Web. Discusses trends in workplace design and corporate culture. Contains 84…

  16. EMC Test Report Electrodynamic Dust Shield

    Science.gov (United States)

    Carmody, Lynne M.; Boyette, Carl B.

    2014-01-01

    This report documents the Electromagnetic Interference E M I evaluation performed on the Electrodynamic Dust Shield (EDS) which is part of the MISSE-X System under the Electrostatics and Surface Physics Laboratory at Kennedy Space Center. Measurements are performed to document the emissions environment associated with the EDS units. The purpose of this report is to collect all information needed to reproduce the testing performed on the Electrodynamic Dust Shield units, document data gathered during testing, and present the results. This document presents information unique to the measurements performed on the Bioculture Express Rack payload; using test methods prepared to meet SSP 30238 requirements. It includes the information necessary to satisfy the needs of the customer per work order number 1037104. The information presented herein should only be used to meet the requirements for which it was prepared.

  17. FY 1998 Blue Book: Computing, Information, and Communications: Technologies for the 21st Century

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — As the 21st century approaches, the rapid convergence of computing, communications, and information technology promises unprecedented opportunities for scientific...

  18. FY 2000 Blue Book: High Performance Computing and Communications: Information Technology Frontiers for a New Millennium

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — As we near the dawn of a new millennium, advances made possible by computing, information, and communications research and development R and D ? once barely...

  19. A contribution to shielding effectiveness analysis of shielded tents

    Directory of Open Access Journals (Sweden)

    Vranić Zoran M.

    2004-01-01

    Full Text Available An analysis of shielding effectiveness (SE of the shielded tents made of the metallised fabrics is given. First, two electromagnetic characteristic fundamental for coupling through electrically thin shield, the skin depth break frequency and the surface resistance or transfer impedance, is defined and analyzed. Then, the transfer function and the SE are analyzed regarding to the frequency range of interest to the Electromagnetic Compatibility (EMC Community.

  20. International Conference on Emerging Technologies for Information Systems, Computing, and Management

    CERN Document Server

    Ma, Tinghuai; Emerging Technologies for Information Systems, Computing, and Management

    2013-01-01

    This book aims to examine innovation in the fields of information technology, software engineering, industrial engineering, management engineering. Topics covered in this publication include; Information System Security, Privacy, Quality Assurance, High-Performance Computing and Information System Management and Integration. The book presents papers from The Second International Conference for Emerging Technologies Information Systems, Computing, and Management (ICM2012) which was held on December 1 to 2, 2012 in Hangzhou, China.

  1. Measurement of the transient shielding effectiveness of shielding cabinets

    Directory of Open Access Journals (Sweden)

    H. Herlemann

    2008-05-01

    Full Text Available Recently, new definitions of shielding effectiveness (SE for high-frequency and transient electromagnetic fields were introduced by Klinkenbusch (2005. Analytical results were shown for closed as well as for non closed cylindrical shields. In the present work, the shielding performance of different shielding cabinets is investigated by means of numerical simulations and measurements inside a fully anechoic chamber and a GTEM-cell. For the GTEM-cell-measurements, a downscaled model of the shielding cabinet is used. For the simulations, the numerical tools CONCEPT II and COMSOL MULTIPHYSICS were available. The numerical results agree well with the measurements. They can be used to interpret the behaviour of the shielding effectiveness of enclosures as function of frequency. From the measurement of the electric and magnetic fields with and without the enclosure in place, the electric and magnetic shielding effectiveness as well as the transient shielding effectiveness of the enclosure are calculated. The transient SE of four different shielding cabinets is determined and discussed.

  2. Gender Differences in Attitudes toward Computers and Performance in the Accounting Information Systems Class

    Science.gov (United States)

    Lenard, Mary Jane; Wessels, Susan; Khanlarian, Cindi

    2010-01-01

    Using a model developed by Young (2000), this paper explores the relationship between performance in the Accounting Information Systems course, self-assessed computer skills, and attitudes toward computers. Results show that after taking the AIS course, students experience a change in perception about their use of computers. Females'…

  3. 75 FR 70672 - Access to Confidential Business Information by Computer Sciences Corporation and Its Identified...

    Science.gov (United States)

    2010-11-18

    ... AGENCY Access to Confidential Business Information by Computer Sciences Corporation and Its Identified... contractor, Computer Sciences Corporation (CSC) of Chantilly, VA and Its Identified Subcontractors, to access... required to support OPPT computer applications; OPPT staff; and their development staff. Specific types of...

  4. Developing Oral and Written Communication Skills in Undergraduate Computer Science and Information Systems Curriculum

    Science.gov (United States)

    Kortsarts, Yana; Fischbach, Adam; Rufinus, Jeff; Utell, Janine M.; Yoon, Suk-Chung

    2010-01-01

    Developing and applying oral and written communication skills in the undergraduate computer science and computer information systems curriculum--one of the ABET accreditation requirements - is a very challenging and, at the same time, a rewarding task that provides various opportunities to enrich the undergraduate computer science and computer…

  5. Consolidating WLCG topology and configuration in the Computing Resource Information Catalogue

    Science.gov (United States)

    Alandes, Maria; Andreeva, Julia; Anisenkov, Alexey; Bagliesi, Giuseppe; Belforte, Stephano; Campana, Simone; Dimou, Maria; Flix, Jose; Forti, Alessandra; di Girolamo, A.; Karavakis, Edward; Lammel, Stephan; Litmaath, Maarten; Sciaba, Andrea; Valassi, Andrea

    2017-10-01

    The Worldwide LHC Computing Grid infrastructure links about 200 participating computing centres affiliated with several partner projects. It is built by integrating heterogeneous computer and storage resources in diverse data centres all over the world and provides CPU and storage capacity to the LHC experiments to perform data processing and physics analysis. In order to be used by the experiments, these distributed resources should be well described, which implies easy service discovery and detailed description of service configuration. Currently this information is scattered over multiple generic information sources like GOCDB, OIM, BDII and experiment-specific information systems. Such a model does not allow to validate topology and configuration information easily. Moreover, information in various sources is not always consistent. Finally, the evolution of computing technologies introduces new challenges. Experiments are more and more relying on opportunistic resources, which by their nature are more dynamic and should also be well described in the WLCG information system. This contribution describes the new WLCG configuration service CRIC (Computing Resource Information Catalogue) which collects information from various information providers, performs validation and provides a consistent set of UIs and APIs to the LHC VOs for service discovery and usage configuration. The main requirements for CRIC are simplicity, agility and robustness. CRIC should be able to be quickly adapted to new types of computing resources, new information sources, and allow for new data structures to be implemented easily following the evolution of the computing models and operations of the experiments.

  6. Computer security: a necessary element of integrated information systems.

    Science.gov (United States)

    Butzen, F; Furler, F

    1986-07-01

    The Matheson Report sees the medical library as playing a key role in a network of interlocking information bases that will extend from central repositories of medical information to each physician's personal records. It appears, however, that the role of security in this vision has not been fully delineated. This paper discusses problems in maintaining the security of confidential medical information, the state of the applicable law, and techniques for security (with special emphasis on the UNIX operating system). It is argued that the absence of security threatens any plan to build an information network, as there will be resistance to any system that may give intruders access to confidential data.

  7. Computer security: a necessary element of integrated information systems.

    Science.gov (United States)

    Butzen, F; Furler, F

    1986-01-01

    The Matheson Report sees the medical library as playing a key role in a network of interlocking information bases that will extend from central repositories of medical information to each physician's personal records. It appears, however, that the role of security in this vision has not been fully delineated. This paper discusses problems in maintaining the security of confidential medical information, the state of the applicable law, and techniques for security (with special emphasis on the UNIX operating system). It is argued that the absence of security threatens any plan to build an information network, as there will be resistance to any system that may give intruders access to confidential data. PMID:3742113

  8. Routinizing the Discovery of Secrets: Computers as Informants.

    Science.gov (United States)

    Marx, Gary T.; Reichman, Nancy

    1984-01-01

    Computers make possible a variety of investigative and enforcement techniques. However, the technology of systematic data searching is subject to at least six sources of error, e.g., incorrectly entered data, none of which can be completely eliminated. Thus, a thought police as envisioned by Orwell remains a technological fiction. (RM)

  9. Recruiting Women into Computer Science and Information Systems

    Science.gov (United States)

    Broad, Steven; McGee, Meredith

    2014-01-01

    While many technical disciplines have reached or are moving toward gender parity in the number of bachelors degrees in those fields, the percentage of women graduating in computer science remains stubbornly low. Many recent efforts to address this situation have focused on retention of undergraduate majors or graduate students, recruiting…

  10. 11 CFR 9003.6 - Production of computer information.

    Science.gov (United States)

    2010-01-01

    ... disbursements; (2) Receipts by and disbursements from a legal and accounting compliance fund under 11 CFR 9003.3... legal and accounting services, including the allocation of payroll and overhead expenditures; (4... explaining the computer system's software capabilities, such as user guides, technical manuals, formats...

  11. Computational Psychiatry: towards a mathematically informed understanding of mental illness

    Science.gov (United States)

    Huys, Quentin J M; Roiser, Jonathan P

    2016-01-01

    Computational Psychiatry aims to describe the relationship between the brain's neurobiology, its environment and mental symptoms in computational terms. In so doing, it may improve psychiatric classification and the diagnosis and treatment of mental illness. It can unite many levels of description in a mechanistic and rigorous fashion, while avoiding biological reductionism and artificial categorisation. We describe how computational models of cognition can infer the current state of the environment and weigh up future actions, and how these models provide new perspectives on two example disorders, depression and schizophrenia. Reinforcement learning describes how the brain can choose and value courses of actions according to their long-term future value. Some depressive symptoms may result from aberrant valuations, which could arise from prior beliefs about the loss of agency (‘helplessness’), or from an inability to inhibit the mental exploration of aversive events. Predictive coding explains how the brain might perform Bayesian inference about the state of its environment by combining sensory data with prior beliefs, each weighted according to their certainty (or precision). Several cortical abnormalities in schizophrenia might reduce precision at higher levels of the inferential hierarchy, biasing inference towards sensory data and away from prior beliefs. We discuss whether striatal hyperdopaminergia might have an adaptive function in this context, and also how reinforcement learning and incentive salience models may shed light on the disorder. Finally, we review some of Computational Psychiatry's applications to neurological disorders, such as Parkinson's disease, and some pitfalls to avoid when applying its methods. PMID:26157034

  12. 4th IEEE/ACIS International Conference on Computer and Information Science

    CERN Document Server

    2016-01-01

    This edited book presents scientific results of the 14th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015) which was held on June 28 – July 1, 2015 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.

  13. 3rd ACIS International Conference on Applied Computing and Information Technology

    CERN Document Server

    2016-01-01

    This edited book presents scientific results of the 3nd International Conference on Applied Computing and Information Technology (ACIT 2015) which was held on July 12-16, 2015 in Okayama, Japan. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.

  14. Actor Model of Computation for Scalable Robust Information Systems : One computer is no computer in IoT

    OpenAIRE

    Hewitt, Carl

    2015-01-01

    International audience; The Actor Model is a mathematical theory that treats “Actors” as the universal conceptual primitives of digital computation. Hypothesis: All physically possible computation can be directly implemented using Actors.The model has been used both as a framework for a theoretical understanding of concurrency, and as the theoretical basis for several practical implementations of concurrent systems. The advent of massive concurrency through client-cloud computing and many-cor...

  15. International Computer and Information Literacy Study: ICILS 2013 User Guide for the International Database

    Science.gov (United States)

    Jung, Michael, Ed.; Carstens, Ralph, Ed.

    2015-01-01

    The International Computer and Information Literacy Study (ICILS) 2013, conducted by the International Association for the Evaluation of Educational Achievement (IEA), studied how students in different countries develop the knowledge, understanding, attitudes, dispositions, and skills that comprise computer and information literacy (CIL). The aim…

  16. Towards a strategy for the introduction of information and computer literacy (ICL) courses

    NARCIS (Netherlands)

    Plomp, T.; Carleer, G.J.

    1987-01-01

    An important goal of the national policy on computers in education in the Netherlands is the familiarization of all citizens with information technology. This policy was a plea for some basic education in information and computer literacy. In the beginning of the implementation of this basic

  17. 78 FR 61870 - Advisory Committee for Computer and Information Science and Engineering; Notice of Meeting

    Science.gov (United States)

    2013-10-04

    ...] [FR Doc No: 2013-24277] NATIONAL SCIENCE FOUNDATION Advisory Committee for Computer and Information Science and Engineering; Notice of Meeting In accordance with Federal Advisory Committee Act (Pub. L. 92...: Advisory Committee for Computer and Information Science and Engineering (1115). Date/Time: Oct 31, 2013: 12...

  18. The Human-Computer Interface and Information Literacy: Some Basics and Beyond.

    Science.gov (United States)

    Church, Gary M.

    1999-01-01

    Discusses human/computer interaction research, human/computer interface, and their relationships to information literacy. Highlights include communication models; cognitive perspectives; task analysis; theory of action; problem solving; instructional design considerations; and a suggestion that human/information interface may be a more appropriate…

  19. Interaction in Information Systems - Beyond Human-Computer Interaction

    DEFF Research Database (Denmark)

    Bækgaard, Lars

    The purpose of this paper is to discuss and analyze the role of interaction in information systems. Interaction represents dynamic relations between actors and other elements in information systems. We introduce a semi-formal notation that we use to describe a set of interaction patterns and we i...

  20. Visualization of hierarchically structured information for human-computer interaction

    Energy Technology Data Exchange (ETDEWEB)

    Cheon, Suh Hyun; Lee, J. K.; Choi, I. K.; Kye, S. C.; Lee, N. K. [Dongguk University, Seoul (Korea)

    2001-11-01

    Visualization techniques can be used to support operator's information navigation tasks on the system especially consisting of an enormous volume of information, such as operating information display system and computerized operating procedure system in advanced control room of nuclear power plants. By offering an easy understanding environment of hierarchically structured information, these techniques can reduce the operator's supplementary navigation task load. As a result of that, operators can pay more attention on the primary tasks and ultimately improve the cognitive task performance. In this report, an interface was designed and implemented using hyperbolic visualization technique, which is expected to be applied as a means of optimizing operator's information navigation tasks. 15 refs., 19 figs., 32 tabs. (Author)

  1. Contaminant deposition building shielding factors for US residential structures.

    Science.gov (United States)

    Dickson, Elijah; Hamby, David; Eckerman, Keith

    2017-10-10

    This paper presents validated building shielding factors designed for contemporary US housing-stock under an idealized, yet realistic, exposure scenario from contaminant deposition on the roof and surrounding surfaces. The building shielding factors are intended for use in emergency planning and level three probabilistic risk assessments for a variety of postulated radiological events in which a realistic assessment is necessary to better understand the potential risks for accident mitigation and emergency response planning. Factors are calculated from detailed computational housing-units models using the general-purpose Monte Carlo N-Particle computational code, MCNP5, and are benchmarked from a series of narrow- and broad-beam measurements analyzing the shielding effectiveness of ten common general-purpose construction materials and ten shielding models representing the primary weather barriers (walls and roofs) of likely US housing-stock. Each model was designed to scale based on common residential construction practices and include, to the extent practical, all structurally significant components important for shielding against ionizing radiation. Calculations were performed for floor-specific locations from contaminant deposition on the roof and surrounding ground as well as for computing a weighted-average representative building shielding factor for single- and multi-story detached homes, both with and without basement as well for single-wide manufactured housing-unit. © 2017 IOP Publishing Ltd.

  2. Investigation of Shielding Properties of Yarns, Twisted with Metal Wire

    Directory of Open Access Journals (Sweden)

    Sandra VARNAITĖ-ŽURAVLIOVA

    2014-04-01

    Full Text Available The development level of the modern techniques and information technologies creates diverse nature electromagnetic fields and electric field accumulations in the human environment. Electrically conductive textiles that protect against electromagnetic waves and electric charge accumulations can be usable as protective covers for work in computer equipment rooms, measuring stands, air and gas filters and so on. One of the methods used in increase of electrical conductivity in textiles is the development of their specific structures (including the development of threads with the metal component. In this paper, unlike the currently used in the world conductive material production method, where different metal fibres are used as an additives to the main fibre composition in order to create a variety of fibres and yarns, a spun yarn with metal wire was prototyped as samples for this research and the parameters of protective properties of these samples were investigated (such as surface resistivity, vertical resistance, etc.. The protective and shielding properties of woven network with prototyped twisted electro conductive thread with a wire (metal wire diameter of 15 microns were investigated. During the investigation the influence of the following factors, such as conductive fibre composition, electrically conductive thread distribution frequency of the longitudinal and transverse direction, on the protective shielding properties of conductive network were analyzed. The research enabled the assessment of influence of electrically conductive fibre yarn composition and its distribution in the woven mesh on protective shielding properties. DOI: http://dx.doi.org/10.5755/j01.ms.20.1.2492

  3. Computational Psychiatry: towards a mathematically informed understanding of mental illness.

    Science.gov (United States)

    Adams, Rick A; Huys, Quentin J M; Roiser, Jonathan P

    2016-01-01

    Computational Psychiatry aims to describe the relationship between the brain's neurobiology, its environment and mental symptoms in computational terms. In so doing, it may improve psychiatric classification and the diagnosis and treatment of mental illness. It can unite many levels of description in a mechanistic and rigorous fashion, while avoiding biological reductionism and artificial categorisation. We describe how computational models of cognition can infer the current state of the environment and weigh up future actions, and how these models provide new perspectives on two example disorders, depression and schizophrenia. Reinforcement learning describes how the brain can choose and value courses of actions according to their long-term future value. Some depressive symptoms may result from aberrant valuations, which could arise from prior beliefs about the loss of agency ('helplessness'), or from an inability to inhibit the mental exploration of aversive events. Predictive coding explains how the brain might perform Bayesian inference about the state of its environment by combining sensory data with prior beliefs, each weighted according to their certainty (or precision). Several cortical abnormalities in schizophrenia might reduce precision at higher levels of the inferential hierarchy, biasing inference towards sensory data and away from prior beliefs. We discuss whether striatal hyperdopaminergia might have an adaptive function in this context, and also how reinforcement learning and incentive salience models may shed light on the disorder. Finally, we review some of Computational Psychiatry's applications to neurological disorders, such as Parkinson's disease, and some pitfalls to avoid when applying its methods. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  4. SHIELDS Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Jordanova, Vania Koleva [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-10-03

    Predicting variations in the near-Earth space environment that can lead to spacecraft damage and failure, i.e. “space weather”, remains a big space physics challenge. A new capability was developed at Los Alamos National Laboratory (LANL) to understand, model, and predict Space Hazards Induced near Earth by Large Dynamic Storms, the SHIELDS framework. This framework simulates the dynamics of the Surface Charging Environment (SCE), the hot (keV) electrons representing the source and seed populations for the radiation belts, on both macro- and micro-scale. In addition to using physics-based models (like RAM-SCB, BATS-R-US, and iPIC3D), new data assimilation techniques employing data from LANL instruments on the Van Allen Probes and geosynchronous satellites were developed. An order of magnitude improvement in the accuracy in the simulation of the spacecraft surface charging environment was thus obtained. SHIELDS also includes a post-processing tool designed to calculate the surface charging for specific spacecraft geometry using the Curvilinear Particle-In-Cell (CPIC) code and to evaluate anomalies' relation to SCE dynamics. Such diagnostics is critically important when performing forensic analyses of space-system failures.

  5. Hypervelocity impact shield

    Science.gov (United States)

    Cour-Palais, Burton G. (Inventor); Crews, Jeanne Lee (Inventor)

    1991-01-01

    A hypervelocity impact shield and method for protecting a wall structure, such as a spacecraft wall, from impact with particles of debris having densities of about 2.7 g/cu cm and impact velocities up to 16 km/s are disclosed. The shield comprises a stack of ultra thin sheets of impactor disrupting material supported and arranged by support means in spaced relationship to one another and mounted to cover the wall in a position for intercepting the particles. The sheets are of a number and spacing such that the impacting particle and the resulting particulates of the impacting particle and sheet material are successively impact-shocked to a thermal state of total melt and/or vaporization to a degree as precludes perforation of the wall. The ratio of individual sheet thickness to the theoretical diameter of particles of debris which may be of spherical form is in the range of 0.03 to 0.05. The spacing between adjacent sheets is such that the debris cloud plume of liquid and vapor resulting from an impacting particle penetrating a sheet does not puncture the next adjacent sheet prior to the arrival thereat of fragment particulates of sheet material and the debris particle produced by a previous impact.

  6. New Toroid shielding design

    CERN Multimedia

    Hedberg V

    On the 15th of June 2001 the EB approved a new conceptual design for the toroid shield. In the old design, shown in the left part of the figure above, the moderator part of the shielding (JTV) was situated both in the warm and cold areas of the forward toroid. It consisted both of rings of polyethylene and hundreds of blocks of polyethylene (or an epoxy resin) inside the toroid vacuum vessel. In the new design, shown to the right in the figure above, only the rings remain inside the toroid. To compensate for the loss of moderator in the toroid, the copper plug (JTT) has been reduced in radius so that a layer of borated polyethylene can be placed around it (see figure below). The new design gives significant cost-savings and is easier to produce in the tight time schedule of the forward toroid. Since the amount of copper is reduced the weight that has to be carried by the toroid is also reduced. Outgassing into the toroid vacuum was a potential problem in the old design and this is now avoided. The main ...

  7. Third International Conference on Computational Science, Engineering and Information Technology (CCSEIT-2013), v.1

    CERN Document Server

    Kumar, Ashok; Annamalai, Annamalai

    2013-01-01

      This book is the proceedings of Third International Conference on Computational Science, Engineering and Information Technology (CCSEIT-2013) that was held in Konya, Turkey, on June 7-9. CCSEIT-2013 provided an excellent international forum for sharing knowledge and results in theory, methodology and applications of computational science, engineering and information technology. This book contains research results, projects, survey work and industrial experiences representing significant advances in the field. The different contributions collected in this book cover five main areas: algorithms, data structures and applications;  wireless and mobile networks; computer networks and communications; natural language processing and information theory; cryptography and information security.  

  8. Information Sharing for Computing Trust Metrics on COTS Electronic Components

    National Research Council Canada - National Science Library

    McMillon, William J

    2008-01-01

    .... It is challenging for the DoD to determine whether and how much to trust in COTS components, given uncertainty and incomplete information about the developers and suppliers of COTS components as well...

  9. Thick Galactic Cosmic Radiation Shielding Using Atmospheric Data

    Science.gov (United States)

    Youngquist, Robert C.; Nurge, Mark A.; Starr, Stanley O.; Koontz, Steven L.

    2013-01-01

    NASA is concerned with protecting astronauts from the effects of galactic cosmic radiation and has expended substantial effort in the development of computer models to predict the shielding obtained from various materials. However, these models were only developed for shields up to about 120 g!cm2 in thickness and have predicted that shields of this thickness are insufficient to provide adequate protection for extended deep space flights. Consequently, effort is underway to extend the range of these models to thicker shields and experimental data is required to help confirm the resulting code. In this paper empirically obtained effective dose measurements from aircraft flights in the atmosphere are used to obtain the radiation shielding function of the earth's atmosphere, a very thick shield. Obtaining this result required solving an inverse problem and the method for solving it is presented. The results are shown to be in agreement with current code in the ranges where they overlap. These results are then checked and used to predict the radiation dosage under thick shields such as planetary regolith and the atmosphere of Venus.

  10. Towards a strategy for the introduction of information and computer literacy (ICL) courses

    OpenAIRE

    Plomp, T.; Carleer, G.J.

    1987-01-01

    An important goal of the national policy on computers in education in the Netherlands is the familiarization of all citizens with information technology. This policy was a plea for some basic education in information and computer literacy. In the beginning of the implementation of this basic education for all a national survey (about grassroots developments) in Dutch junior secondary education was executed (Spring, 1984) with the following objectives: (i) to collect information which can serv...

  11. The Information Science Experiment System - The computer for science experiments in space

    Science.gov (United States)

    Foudriat, Edwin C.; Husson, Charles

    1989-01-01

    The concept of the Information Science Experiment System (ISES), potential experiments, and system requirements are reviewed. The ISES is conceived as a computer resource in space whose aim is to assist computer, earth, and space science experiments, to develop and demonstrate new information processing concepts, and to provide an experiment base for developing new information technology for use in space systems. The discussion covers system hardware and architecture, operating system software, the user interface, and the ground communication link.

  12. Towards GLUE2 evolution of the computing element information model

    CERN Document Server

    Andreozzi, S; Field, L; Kónya, B

    2008-01-01

    A key advantage of Grid systems is the ability to share heterogeneous resources and services between traditional administrative and organizational domains. This ability enables virtual pools of resources to be created and assigned to groups of users. Resource awareness, the capability of users or user agents to have knowledge about the existence and state of resources, is required in order utilize the resource. This awareness requires a description of the services and resources typically defined via a community-agreed information model. One of the most popular information models, used by a number of Grid infrastructures, is the GLUE Schema, which provides a common language for describing Grid resources. Other approaches exist, however they follow different modeling strategies. The presence of different flavors of information models for Grid resources is a barrier for enabling inter-Grid interoperability. In order to solve this problem, the GLUE Working Group in the context of the Open Grid Forum was started. ...

  13. Shielding from cosmic radiation for interplanetary missions Active and passive methods

    CERN Document Server

    Spillantini, P; Durante, M; Müller-Mellin, R; Reitz, G; Rossi, L; Shurshakov, V; Sorbi, M

    2007-01-01

    Shielding is arguably the main countermeasure for the exposure to cosmic radiation during interplanetary exploratory missions. However, shielding of cosmic rays, both of galactic or solar origin, is problematic, because of the high energy of the charged particles involved and the nuclear fragmentation occurring in shielding materials. Although computer codes can predict the shield performance in space, there is a lack of biological and physical measurements to benchmark the codes. An attractive alternative to passive, bulk material shielding is the use of electromagnetic fields to deflect the charged particles from the spacecraft target. Active shielding concepts based on electrostatic fields, plasma, or magnetic fields have been proposed in the past years, and should be revised based on recent technological improvements. To address these issues, the European Space Agency (ESA) established a Topical Team (TT) in 2002 including European experts in the field of space radiation shielding and superconducting magn...

  14. Computers behind bars : Information technology in Canadian prison libraries

    DEFF Research Database (Denmark)

    Prange, Laurie

    This report is the result of an independent study undertaken with the Faculty of Information and Media Studies (FIMS) at The University of Western Ontario (UWO) and advised by Dr. Carole Farber, Professor. The focus of this study is upon the impact the increased popularity of electronic provision...

  15. A Neural Information Field Approach to Computational Cognition

    Science.gov (United States)

    2016-11-18

    of irrelevant information) during the task. The spiking neural model accounts for the probability of first recall, recency effects , primacy effects ...neuron models, allowing the simulated testing of drug effects on cognitive performance; demonstrated a scalable neural model of motor planning... effects of distraction in working memory; shown a hippocampal model able to perform context sensitive sequence encoding and retrieval; proposed what is

  16. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  17. School Librarians Teach Subject Area 10: Computer and Information Sciences

    Science.gov (United States)

    Dow, Mirah J. Ingram

    2010-01-01

    School librarians currently speak about school libraries as the largest classroom in the building. If so, how can these librarians describe what they teach? This article explains the user-centered instructional role of secondary school librarians in teaching information and technology literacy skills, as well as how they can authoritatively ensure…

  18. Computers and Information Systems in Planning and Related Governmental Functions.

    Science.gov (United States)

    Tucker, Dorothy; Vance, Mary, Ed.

    The 266 items cited include material published since July 1960, organized in the following ten groups: (1) general discussion, and feasibility; (2) statewide electronic data processing (EDP) systems; (3) EDP in local governments; (4) intergovernmental EDP systems; (5) EDP in the planning agency; (6) data banks and information systems; (7) computer…

  19. Radiation Shielding for Fusion Reactors

    Energy Technology Data Exchange (ETDEWEB)

    Santoro, R.T.

    1999-10-01

    Radiation shielding requirements for fusion reactors present different problems than those for fission reactors and accelerators. Fusion devices, particularly tokamak reactors, are complicated by geometry constraints that complicate disposition of fully effective shielding. This paper reviews some of these shielding issues and suggested solutions for optimizing the machine and biological shielding. Radiation transport calculations are essential for predicting and confirming the nuclear performance of the reactor and, as such, must be an essential part of the reactor design process. Development and optimization of reactor components from the first wall and primary shielding to the penetrations and containment shielding must be carried out in a sensible progression. Initial results from one-dimensional transport calculations are used for scoping studies and are followed by detailed two- and three-dimensional analyses to effectively characterize the overall radiation environment. These detail model calculations are essential for accounting for the radiation leakage through ports and other penetrations in the bulk shield. Careful analysis of component activation and radiation damage is cardinal for defining remote handling requirements, in-situ replacement of components, and personnel access at specific locations inside the reactor containment vessel. Radiation shielding requirements for fusion reactors present different problems than those for fission reactors and accelerators. Fusion devices, particularly tokamak reactors, are complicated by geometry constraints that complicate disposition of fully effective shielding. This paper reviews some of these shielding issues and suggested solutions for optimizing the machine and biological shielding. Radiation transport calculations are essential for predicting and confirming the nuclear performance of the reactor and, as such, must be an essential part of the reactor design process. Development and optimization of reactor

  20. Information-seeking behavior and computer literacy among resident doctors in Maiduguri, Nigeria.

    Science.gov (United States)

    Abbas, A D; Abubakar, A M; Omeiza, B; Minoza, K

    2013-01-01

    Resident doctors are key actors in patient management in all the federal training institutions in nigeria. Knowing the information-seeking behavior of this group of doctors and their level of computer knowledge would facilitate informed decision in providing them with the relevant sources of information as well as encouraging the practice of evidence-based medicine. This is to examine information-seeking behavior among resident doctors and analyze its relationship to computer ownership and literacy. A pretested self-administered questionnaire was used to obtain information from the resident doctors in the University of Maiduguri Teaching Hospital (UMTH) and the Federal Neuro-Psychiatry Hospital (FNPH). The data fields requested included the biodata, major source of medical information, level of computer literacy, and computer ownership. Other questions included were their familiarity with basic computer operations as well as versatility on the use of the Internet and possession of an active e-mail address. Out of 109 questionnaires distributed 100 were returned (91.7% response rate). Seventy three of the 100 respondents use printed material as their major source of medical information. Ninety three of the respondents own a laptop, a desktop or both, while 7 have no computers. Ninety-four respondents are computer literate while 6 are computer illiterates. Seventy-five respondents have an e-mail address while 25 do not have e-mail address. Seventy-five search the Internet for information while 25 do not know how to use the Internet. Despite the high computer ownership and literacy rate among resident doctors, the printed material remains their main source of medical information.

  1. Socket Shield Technique

    OpenAIRE

    Ferreira, João Eduardo Freitas

    2017-01-01

    Nos dias atuais, é cada vez mais comum a realização de extrações de dentes que estejam severamente comprometidos e substituí-los por implantes dentários. Após extração, existe uma reabsorção de osso alveolar que vai resultar numa perda de osso vertical e horizontal, tornando-se um dos fatores que subsequentemente se vai colocar como uma das maiores dificuldades na colocação de implantes. A técnica Socket Shield é uma técnica de preservação de osso alveolar em situações de implantes imediatos,...

  2. Welding shield for coupling heaters

    Science.gov (United States)

    Menotti, James Louis

    2010-03-09

    Systems for coupling end portions of two elongated heater portions and methods of using such systems to treat a subsurface formation are described herein. A system may include a holding system configured to hold end portions of the two elongated heater portions so that the end portions are abutted together or located near each other; a shield for enclosing the end portions, and one or more inert gas inlets configured to provide at least one inert gas to flush the system with inert gas during welding of the end portions. The shield may be configured to inhibit oxidation during welding that joins the end portions together. The shield may include a hinged door that, when closed, is configured to at least partially isolate the interior of the shield from the atmosphere. The hinged door, when open, is configured to allow access to the interior of the shield.

  3. Radiation production and absorption in human spacecraft shielding systems under high charge and energy Galactic Cosmic Rays: Material medium, shielding depth, and byproduct aspects

    Science.gov (United States)

    Barthel, Joseph; Sarigul-Klijn, Nesrin

    2018-03-01

    Deep space missions such as the planned 2025 mission to asteroids require spacecraft shields to protect electronics and humans from adverse effects caused by the space radiation environment, primarily Galactic Cosmic Rays. This paper first reviews the theory on how these rays of charged particles interact with matter, and then presents a simulation for a 500 day Mars flyby mission using a deterministic based computer code. High density polyethylene and aluminum shielding materials at a solar minimum are considered. Plots of effective dose with varying shield depth, charged particle flux, and dose in silicon and human tissue behind shielding are presented.

  4. Shielding efficiency of metal hydrides and borohydrides in fusion reactors

    DEFF Research Database (Denmark)

    Singh, Vishvanath P.; Badiger, Nagappa M.; Gerward, Leif

    2016-01-01

    at energies 0.015 MeV to15 MeV, and for penetration depths up to 40 mean free paths. Fast-neutron shielding efficiency has been characterized by the effective neutron removal cross-section. It is shown that ZrH2 and VH2 are very good shielding materials for gamma rays and fast neutrons due to their suitable......Mass attenuation coefficients, mean free paths and exposure buildup factors have been used to characterize the shielding efficiency of metal hydrides and borohydrides, with high density of hydrogen. Gamma ray exposure buildup factors were computed using five-parameter geometric progression fitting...... combination of low-and high-Z elements. The present work should be useful for the selection and design of blankets and shielding, and for dose evaluation for components in fusion reactors....

  5. Shielding of electromagnetic fields of current sources by spherical enclosures

    Science.gov (United States)

    Shastry, S. V. K.; Rao, M. N.; Katti, V. R.

    Expressions for the shielding effectiveness of a conductive spherical enclosure excited by a Hertzian dipole have been derived using the dyadic Green's function technique. This technique has the advantage that the fields inside or outside the enclosure due to arbitrary current distribution may be found by employing the same set of dyadic Green's functions. The shielding effectiveness for plane wave incidence has been determined by considering the limiting case of the current source external to the spherical shell. Computed values of shielding effectiveness deduced in this manner have been compared with those obtained by the numerical evaluation of the expressions derived by earlier authors. The theory presented here may be useful to EMC (electromagnetic compatibility) engineers who must consider electromagnetic coupling from current sources in the vicinity of shielding enclosures.

  6. Shielding efficiency of metal hydrides and borohydrides in fusion reactors

    Directory of Open Access Journals (Sweden)

    Singh Vishvanath P.

    2016-01-01

    Full Text Available Mass attenuation coefficients, mean free paths and exposure buildup factors have been used to characterize the shielding efficiency of metal hydrides and borohydrides, with high density of hydrogen. Gamma ray exposure buildup factors were computed using five-parameter geometric progression fitting at energies 0.015 MeV to15 MeV, and for penetration depths up to 40 mean free paths. Fast-neutron shielding efficiency has been characterized by the effective neutron removal cross-section. It is shown that ZrH2 and VH2 are very good shielding materials for gamma rays and fast neutrons due to their suitable combination of low- and high-Z elements. The present work should be useful for the selection and design of blankets and shielding, and for dose evaluation for components in fusion reactors.

  7. Computed radiography in scoliosis. Diagnostic information and radiation dose

    Energy Technology Data Exchange (ETDEWEB)

    Jonsson, A. [Dept. of Diagnostic Radiology, Univ. Hospital, Lund (Sweden); Jonsson, K. [Dept. of Diagnostic Radiology, Univ. Hospital, Lund (Sweden); Eklund, K. [Dept. of Diagnostic Radiology, Univ. Hospital, Lund (Sweden); Holje, G. [Dept. of Diagnostic Radiology, Univ. Hospital, Lund (Sweden); Pettersson, H. [Dept. of Diagnostic Radiology, Univ. Hospital, Lund (Sweden)

    1995-07-01

    The diagnostic information and radiation dose in scoliosis examinations performed with air-gap technique using stimulable phosphor imaging plates were determined in a prospective study. Overlapping p.a. images of the thoracic and lumbar spine in 9 patients were obtained with 4 different exposure settings according to patient size. Equal exposure settings were used for the 2 images. Two images of 18 were judged inferior in depicting the landmarks of scoliosis measurement, requiring re-exposure. Sixteen images were judged of adequate or good quality. The mean entrance doses in the central beam for the 4 patient groups were in the interval of 0.05 to 0.12 mGy for both images. The skin doses on the breasts were in the range of 0.00 to 0.03 mGy. The presented technique thus results in a low radiation dose with sufficient diagnostic information in radiography of scoliosis. (orig.).

  8. Instrumentation for Scientific Computing in Neural Networks, Information Science, Artificial Intelligence, and Applied Mathematics.

    Science.gov (United States)

    1987-10-01

    include Security Classification) Instrumentation for scientific computing in neural networks, information science, artificial intelligence, and...instrumentation grant to purchase equipment for support of research in neural networks, information science, artificail intellignece , and applied mathematics...in Neural Networks, Information Science, Artificial Intelligence, and Applied Mathematics Contract AFOSR 86-0282 Principal Investigator: Stephen

  9. Integrated Academic Information Management Systems (IAIMS). Part III. Implementation of integrated information services. Library/computer center partnership.

    Science.gov (United States)

    Feng, C C; Weise, F O

    1988-03-01

    Information technologies are changing the traditional role of the library from that of a repository of information to that of an aggressive provider of information services utilizing electronic methods. In many cases, the library cannot realistically achieve this transformation independently but must work with the computer center to reach its objectives. Various models of the integration of libraries and computer centers are thus emerging. At the University of Maryland at Baltimore the Health Sciences Library and the Information Resources Management Division have developed a partnership based on functional relationships without changing the organizational structure. Strategic planning for an Integrated Academic Information Management System (IAIMS) acted as a catalyst in the process. The authors present the evolution of the partnership and discuss current projects being developed jointly by the two units.

  10. Second Annual AEC Scientific Computer Information Exhange Meeting. Proceedings of the technical program theme: computer graphics

    Energy Technology Data Exchange (ETDEWEB)

    Peskin,A.M.; Shimamoto, Y.

    1974-01-01

    The topic of computer graphics serves well to illustrate that AEC affiliated scientific computing installations are well represented in the forefront of computing science activities. The participant response to the technical program was overwhelming--both in number of contributions and quality of the work described. Session I, entitled Advanced Systems, contains presentations describing systems that contain features not generally found in graphics facilities. These features can be roughly classified as extensions of standard two-dimensional monochromatic imaging to higher dimensions including color and time as well as multidimensional metrics. Session II presents seven diverse applications ranging from high energy physics to medicine. Session III describes a number of important developments in establishing facilities, techniques and enhancements in the computer graphics area. Although an attempt was made to schedule as many of these worthwhile presentations as possible, it appeared impossible to do so given the scheduling constraints of the meeting. A number of prospective presenters 'came to the rescue' by graciously withdrawing from the sessions. Some of their abstracts have been included in the Proceedings.

  11. Successful public-private partnerships: The NYPD shield model.

    Science.gov (United States)

    Amadeo, Vincent; Iannone, Stephen

    2017-12-01

    This article will identify the challenges that post 9/11 law enforcement faces regarding privatepublic partnerships and describe in detail the NYPD Shield programme, created to combat those challenges. Recommendations made by the 911 Commission included the incorporation of the private sector into future homeland security strategies. One such strategy is NYPD Shield. This programme is a nationally recognized award-winning public-private partnership dedicated to providing counterterrorism training and information sharing with government agencies, non-government organizations, private businesses, and the community. Information is shared through several platforms that include a dedicated website, instruction of counterterrorism training curricula, e-mail alerts, intelligence assessments and the hosting of quarterly conferences. This article also details how the NYPD Shield is providing its successful template to other law enforcement agencies enabling them to initiate similar programmes in their respective jurisdictions, and in doing so joining a National Shield Network.

  12. 10 CFR 727.5 - What acknowledgment and consent is required for access to information on DOE computers?

    Science.gov (United States)

    2010-01-01

    ... information on DOE computers? 727.5 Section 727.5 Energy DEPARTMENT OF ENERGY CONSENT FOR ACCESS TO INFORMATION ON DEPARTMENT OF ENERGY COMPUTERS § 727.5 What acknowledgment and consent is required for access to information on DOE computers? An individual may not be granted access to information on a DOE...

  13. Metabolic flux distributions: genetic information, computational predictions, and experimental validation.

    Science.gov (United States)

    Blank, Lars M; Kuepfer, Lars

    2010-05-01

    Flux distributions in intracellular metabolic networks are of immense interest to fundamental and applied research, since they are quantitative descriptors of the phenotype and the operational mode of metabolism in the face of external growth conditions. In particular, fluxes are of relevance because they do not belong to the cellular inventory (e.g., transcriptome, proteome, metabolome), but are rather quantitative moieties, which link the phenotype of a cell to the specific metabolic mode of operation. A frequent application of measuring and redirecting intracellular fluxes is strain engineering, which ultimately aims at shifting metabolic activity toward a desired product to achieve a high yield and/or rate. In this article, we first review the assessment of intracellular flux distributions by either qualitative or rather quantitative computational methods and also discuss methods for experimental measurements. The tools at hand will then be exemplified on strain engineering projects from the literature. Finally, the achievements are discussed in the context of future developments in Metabolic Engineering and Synthetic Biology.

  14. Psychological and pedagogical support of the information and computer activities of students

    Directory of Open Access Journals (Sweden)

    Нина Львовна Сунгурова

    2014-12-01

    Full Text Available The article presents the theoretical foundations of psychological researches of the process of informatization in education, is denoted the problem information and computer activity of students. Information-computer activity of students means a qualitatively special kind of activity. In the interaction of with the modern technologies there are changes and development the indicative and operational and technical components of the activity, the spatial and temporal boundaries are transformed, the motivation of applications is formed. Information-computer environment as the context activity of the subject becomes the new source of the psychic neoplasms. The article discusses the psychological effects of using of information technologies, the conditions for ensuring the success of information and computer activity of students are allocated. The author offers a program of psycho-pedagogical support of training of students in the information and educational environment. The technology includes the following areas: the diagnostic, consultative work of the teacher and students' own activity. The organization of student support enhances knowledge about the socio-psychological aspects of the of information technology, social valuable motivation is formed, skills of the avoidance negative consequences of informatization are developed. In the process of work monitoring is conducted, individual-typological features of personality of students in interaction with technology are studied, correction of deviations is held, the psychological readiness of the subject to a productive application of information and computer technology is formed, information competence develops.

  15. Granular computing and intelligent systems design with information granules of higher order and higher type

    CERN Document Server

    Pedrycz, Witold; Chen, Shyi-Ming

    2011-01-01

    Information granules are conceptual entities that aid the perception of complex phenomena. This book looks at granular computing techniques such as algorithmic pursuits and includes diverse applications and case studies from fields such as power engineering.

  16. Information Risks Analysis in the Cloud Computing System on the basis of Intellectual Technologies

    Directory of Open Access Journals (Sweden)

    Alina Yurievna Sentsova

    2013-02-01

    Full Text Available In this article the possibility of the fuzzy cognitive maps application for the purpose of artificial neural network sample data set formation are used for information security risks estimation in cloud computing system.

  17. FY 1996 Blue Book: High Performance Computing and Communications: Foundations for America`s Information Future

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Federal High Performance Computing and Communications HPCC Program will celebrate its fifth anniversary in October 1996 with an impressive array of...

  18. VA INFORMATION SYSTEMS: Computer Security Weaknesses Persist at the Veterans Health Administration

    National Research Council Canada - National Science Library

    2000-01-01

    .... To determine the status of computer security within VHA, we (1) evaluated information system general controls at the VA Maryland Health Cafe System, the New Mexico VA Health Care System, and the VA North Texas Health Care System and (2...

  19. Linguistic and Informational Specifics of Computer-Mediated Communication: Structural Aspect

    National Research Council Canada - National Science Library

    Barkovich, Aleksandr

    2015-01-01

    The practice of computer-mediated communication is determined by its linguistic content and information format that preconditions syncretic study of computermediated discourse with due regard to its dual nature...

  20. FY 1994 Blue Book: High Performance Computing and Communications: Toward a National Information Infrastructure

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — government and industry that advanced computer and telecommunications technologies could provide huge benefits throughout the research community and the entire U.S....

  1. FY 1997 Blue Book: High Performance Computing and Communications: Advancing the Frontiers of Information Technology

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Federal High Performance Computing and Communications HPCC Program will celebrate its fifth anniversary in October 1996 with an impressive array of...

  2. A ROADMAP FOR A COMPUTATIONAL THEORY OF THE VALUE OF INFORMATION IN ORIGIN OF LIFE QUESTIONS

    National Research Council Canada - National Science Library

    Soumya Banerjee

    2016-01-01

    .... This article proposes a role for information processing in questions around the origin of life and suggests how computational simulations may yield insights into questions related to the origin...

  3. Principal Component Analysis - A Powerful Tool in Computing Marketing Information

    Directory of Open Access Journals (Sweden)

    Constantin C.

    2014-12-01

    Full Text Available This paper is about an instrumental research regarding a powerful multivariate data analysis method which can be used by the researchers in order to obtain valuable information for decision makers that need to solve the marketing problem a company face with. The literature stresses the need to avoid the multicollinearity phenomenon in multivariate analysis and the features of Principal Component Analysis (PCA in reducing the number of variables that could be correlated with each other to a small number of principal components that are uncorrelated. In this respect, the paper presents step-by-step the process of applying the PCA in marketing research when we use a large number of variables that naturally are collinear.

  4. Fine-grained Information Flow for Concurrent Computation

    DEFF Research Database (Denmark)

    Li, Ximeng

    is an important approach to the protection of systems against such threats. Notable examples include tainting analyses in languages such as Javascript, and program transformations on cryptographic algorithms to avoid information leakage through running time. A wide variety of techniques, including type systems......” and “what” into consideration, emphasizing the importance of the integrity case where the former is more sensitive than the latter. This case captures the effect of Message Authentication Codes (MAC) and the consequence of Denial of Service (DoS) attacks. It is also proved that the property degenerates...... recently been studied for sequential programs. We generalize the use and enforcement of content-dependent flow policies to concurrent, communicating processes. A security type system is developed, incorporating a Hoare logic component that provides approximations of the memory contents at different program...

  5. Designing for social configurations : Pattern languages to inform the design of ubiquitous computing

    NARCIS (Netherlands)

    Denef, S.; Opperman, R.; Keyson, D.V.

    2011-01-01

    In this paper we present our approach for informing the design of ubiquitous computing by using pattern languages of human practice. By linking ethnography and design, this approach makes it possible to tackle the social dimension of ubiquitous computing in the design processes. Adding to the

  6. Research on Badminton Footwork Training and Teaching Effect based on Computer Aided Information Processing

    National Research Council Canada - National Science Library

    Chao Chen

    2016-01-01

    ... in badminton sport; also will improve students' heart and lung function. Keywords: Information Processing, badminton training, teaching quality, technical level 1.Introduction With the development of computer technology, multimedia computer technology has been widely used in the field of physical education. The application of this representative is ...

  7. New Mathematics of Information: Homotopical and Higher Categorical Foundations of Information and Computation

    Science.gov (United States)

    2014-09-13

    interpretation, such formal reasoning can encompass abstract programming languages, constructive mathematics , and large swaths of classical mathematics ...its applications to pure and applied mathematics and computation, and enhanced existing proof assistants to implement them. This work will lead to...the wide-spread use of computational proof assistants, large-scale formalization of mathematics , and the creation of powerful scientific tools with impact on challenging problems of DoD interest.

  8. Development of a computer code for determining the thickness of shielding used in cardiac angiography techniques; Desenvolvimento de um codigo computacional para determinacao da espessura de barreiras utilizadas em tecnicas de angiografia cardiaca

    Energy Technology Data Exchange (ETDEWEB)

    Lava, Deise D.; Borges, Diogo da S.; Affonso, Renato R.W.; Moreira, Maria de L.; Guimaraes, Antonio C.F., E-mail: deise_dy@hotmail.com, E-mail: diogosb@outlook.com, E-mail: raoniwa@yahoo.com.br, E-mail: malu@ien.gov.br, E-mail: tony@ien.gov.br [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil)

    2014-07-01

    The construction of an effective shielding against the interaction of ionizing radiation in X-ray rooms requires consideration of many variables. The methodology used for specification of a primary and secondary shielding thickness of a X-ray room considers the following factors: use factor, occupational factor, distance between the source and the wall, workload, Kerma in the air and distance between the patient and the receptor. The program built from this data, has the objective of identifying and using variables in functions obtained through linear regressions of graphics offered by NCRP Report-147 (Structural Shielding Design for Medical X-Ray Imaging Facilities) for the shielding calculation of the room walls as wall dark room and adjacent areas. With the methodology constructed a program validation is done by comparison of results with a base case provided by that report. The values of the thicknesses obtained comprise various materials such as steel, wood and concrete. Once validated an application is made in a real case of X-ray room. His visual construction is done with the help of software used in modeling of interiors and exteriors. The construction of shielding calculating program has the goal of being an easy tool for planning of X-ray rooms in order to meet the established limits by CNEN-NN-3:01 published in September 2011.

  9. Shielding of a hadron in a finite e-beam

    Energy Technology Data Exchange (ETDEWEB)

    Elizarov A.; Litvinenko, V.; Wang, G.

    2012-05-20

    The thorough study of coherent electron cooling, the modern cooling technique capable to deal with accelerators operating in the range of few TeVs, rises many interesting questions. One of them is a shielding dynamics of a hadron in an electron beam. Now this effect is computed analytically in the infinite beam approximation. Many effects are drastically different in finite and infinite plasmas. Here we propose a method to compute the dynamical shielding effect in a finite cylindrical plasma - the realistic model of an electron beam in accelerators.

  10. How social and non-social information influence classification decisions: A computational modelling approach.

    Science.gov (United States)

    Puskaric, Marin; von Helversen, Bettina; Rieskamp, Jörg

    2017-08-01

    Social information such as observing others can improve performance in decision making. In particular, social information has been shown to be useful when finding the best solution on one's own is difficult, costly, or dangerous. However, past research suggests that when making decisions people do not always consider other people's behaviour when it is at odds with their own experiences. Furthermore, the cognitive processes guiding the integration of social information with individual experiences are still under debate. Here, we conducted two experiments to test whether information about other persons' behaviour influenced people's decisions in a classification task. Furthermore, we examined how social information is integrated with individual learning experiences by testing different computational models. Our results show that social information had a small but reliable influence on people's classifications. The best computational model suggests that in categorization people first make up their own mind based on the non-social information, which is then updated by the social information.

  11. 3rd International Conference on "Emerging Research in Computing, Information, Communication and Applications"

    CERN Document Server

    Prasad, NH; Nalini, N

    2015-01-01

    This proceedings volume covers the proceedings of ERCICA 2015. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of  Computing, Information, Communication and their Applications. The contents of this book cover emerging research areas in fields of Computing, Information, Communication and Applications. This will prove useful to both researchers and practicing engineers.

  12. Morphometry of terrestrial shield volcanoes

    Science.gov (United States)

    Grosse, Pablo; Kervyn, Matthieu

    2018-03-01

    Shield volcanoes are described as low-angle edifices built primarily by the accumulation of successive lava flows. This generic view of shield volcano morphology is based on a limited number of monogenetic shields from Iceland and Mexico, and a small set of large oceanic islands (Hawaii, Galápagos). Here, the morphometry of 158 monogenetic and polygenetic shield volcanoes is analyzed quantitatively from 90-meter resolution SRTM DEMs using the MORVOLC algorithm. An additional set of 24 lava-dominated 'shield-like' volcanoes, considered so far as stratovolcanoes, are documented for comparison. Results show that there is a large variation in shield size (volumes from 0.1 to > 1000 km3), profile shape (height/basal width (H/WB) ratios mostly from 0.01 to 0.1), flank slope gradients (average slopes mostly from 1° to 15°), elongation and summit truncation. Although there is no clear-cut morphometric difference between shield volcanoes and stratovolcanoes, an approximate threshold can be drawn at 12° average slope and 0.10 H/WB ratio. Principal component analysis of the obtained database enables to identify four key morphometric descriptors: size, steepness, plan shape and truncation. Hierarchical cluster analysis of these descriptors results in 12 end-member shield types, with intermediate cases defining a continuum of morphologies. The shield types can be linked in terms of growth stages and shape evolution, related to (1) magma composition and rheology, effusion rate and lava/pyroclast ratio, which will condition edifice steepness; (2) spatial distribution of vents, in turn related to the magmatic feeding system and the tectonic framework, which will control edifice plan shape; and (3) caldera formation, which will condition edifice truncation.

  13. Active shielding model for hyperbolic equations

    Science.gov (United States)

    Ryaben'kii, Victor S.; Utyuzhnikov, Sergei V.

    2006-12-01

    The problem of active shielding (AS) in application to hyperbolic equations is analysed. According to the problem, two domains effecting each other via distributed source terms are considered. It is required to implement additional sources nearby the common boundary of the domains in order to "isolate" one domain from the action of the other domain. It is important to note that the total field of the original sources is only known. In the paper, the theory of difference potentials is applied to the system of hyperbolic equations for the first time. It allows one to obtain a one-layer AS not requiring any additional computations. Local one-layer and two-layer AS sources are obtained for an arbitrary hyperbolic system. The solution does not require either the knowledge of the Green's function or the specific characteristics of the sources and medium. The optimal one-layer AS solution is derived in the case of free space. In particular, the results are applicable to the system of acoustics equations. The questions related to a practical realization including the mutual situation of the primary and secondary sources, as well as the measurement point, are discussed. The active noise shielding can be realized via a one-layer source term requiring the measurements only at one layer nearby the domain shielded.

  14. A new distributed computing model of mobile spatial information service grid based on mobile agent

    Science.gov (United States)

    Tian, Gen; Liu, Miao-long

    2009-10-01

    A new distributed computing model of mobile spatial information service is studied based on grid computing environment. Key technologies are presented in the model, including mobile agent (MA) distributed computing, grid computing, spatial data model, location based service (LBS), global positioning system (GPS), code division multiple access (CDMA), transfer control protocol/internet protocol (TCP/IP), and user datagram protocol (UDP). In order to deal with the narrow bandwidth and instability of the wireless internet, distributed organization of tremendous spatial data, limited processing speed and low memory of mobile devices, a new mobile agent based mobile spatial information service grid (MSISG) architecture is further proposed that has good load balance, high processing efficiency, less network communication and thus suitable for mobile distributed computing environment. It can provide applications of spatial information distributed computing and mobile service. The theories and technologies architecture of MSISG are built originally from the base, including spatial information mobile agent model, distributed grid geographic information system (GIS) server model, mobile agent server model and mobile GIS client model. An application system for MSISG is therefore developed authorship by visual c++ and embedded visual c++. A field test is carried out through this system in Shanghai, and the results show that the proposed model and methods are feasible and adaptable for mobile spatial information service.

  15. Seamless personal health information system in cloud computing.

    Science.gov (United States)

    Chung, Wan-Young; Fong, Ee May

    2014-01-01

    Noncontact ECG measurement has gained popularity these days due to its noninvasive and conveniences to be applied on daily life. This approach does not require any direct contact between patient's skin and sensor for physiological signal measurement. The noncontact ECG measurement is integrated with mobile healthcare system for health status monitoring. Mobile phone acts as the personal health information system displaying health status and body mass index (BMI) tracking. Besides that, it plays an important role being the medical guidance providing medical knowledge database including symptom checker and health fitness guidance. At the same time, the system also features some unique medical functions that cater to the living demand of the patients or users, including regular medication reminders, alert alarm, medical guidance, appointment scheduling. Lastly, we demonstrate mobile healthcare system with web application for extended uses, thus health data are clouded into web server system and web database storage. This allows remote health status monitoring easily and so forth it promotes a cost effective personal healthcare system.

  16. A bibliometric study on chemical information and computer sciences focusing on literature of JCICS.

    Science.gov (United States)

    Onodera, N

    2001-01-01

    A bibliometric approach was used to survey the state-of-the-art of research in the field of chemical information and computer sciences (CICS). By examining the CA database for the articles abstracted under the subsection "Chemical information, documentation, and data processing", Journal of Chemical Information and Computer Sciences (JCICS) was identified to have been the top journal in this subsection for the last 30 years. Based on this result, CA subsections and controlled index terms given to JCICS articles were analyzed to see trends in subjects and topics in the CICS field during the last two decades. These analyses revealed that the subjects of research in CICS have diversified from traditional information science and computer applications to chemistry to "molecular information sciences". The SCISEARCH database was used to grasp interdependency between JCICS and other key journals and also the international nature of JCICS in its publications and citedness.

  17. InfInformation Theory and Computational Thermodynamics: Lessons for Biology from Physics

    Directory of Open Access Journals (Sweden)

    Hector Zenil

    2012-11-01

    Full Text Available We survey a few aspects of the thermodynamics of computation, connecting information, thermodynamics, computability and physics. We suggest some lines of research into how information theory and computational thermodynamics can help us arrive at a better understanding of biological processes. We argue that while a similar connection between information theory and evolutionary biology seems to be growing stronger and stronger, biologists tend to use information simply as a metaphor. While biologists have for the most part been influenced and inspired by information theory as developed by Claude Shannon, we think the introduction of algorithmic complexity into biology will turn out to be a much deeper and more fruitful cross-pollination.

  18. Preparing for Life in a Digital Age: The IEA International Computer and Information Literacy Study International Report

    National Research Council Canada - National Science Library

    Fraillon, Julian; Ainley, John; Schulz, Wolfram; Friedman, Tim; Gebhardt, Eveline

    2014-01-01

    ... this regard? The IEA International Computer and Information Literacy Study (ICILS) responded to this question by studying the extent to which young people have developed computer and information literacy (CIL...

  19. Information Retrieval or Information Morass? Implications of Library Automation and Computing Networks in Central and Eastern Europe for the Creation of a Global Information Infrastructure.

    Science.gov (United States)

    Borgman, Christine L.

    1995-01-01

    Discussion of the Global Information Infrastructure (GII) focuses on a longitudinal study conducted in Central and Eastern Europe that investigated two issues: (1) the relationship between computing networks and library automation in establishing a national information infrastructure, and (2) requirements for library automation for exchanging…

  20. Algorithm-structured computer arrays and networks architectures and processes for images, percepts, models, information

    CERN Document Server

    Uhr, Leonard

    1984-01-01

    Computer Science and Applied Mathematics: Algorithm-Structured Computer Arrays and Networks: Architectures and Processes for Images, Percepts, Models, Information examines the parallel-array, pipeline, and other network multi-computers.This book describes and explores arrays and networks, those built, being designed, or proposed. The problems of developing higher-level languages for systems and designing algorithm, program, data flow, and computer structure are also discussed. This text likewise describes several sequences of successively more general attempts to combine the power of arrays wi

  1. Dynamic stepping information process method in mobile bio-sensing computing environments.

    Science.gov (United States)

    Lee, Tae-Gyu; Lee, Seong-Hoon

    2014-01-01

    Recently, the interest toward human longevity free from diseases is being converged as one system frame along with the development of mobile computing environment, diversification of remote medical system and aging society. Such converged system enables implementation of a bioinformatics system created as various supplementary information services by sensing and gathering health conditions and various bio-information of mobile users to set up medical information. The existing bio-information system performs static and identical process without changes after the bio-information process defined at the initial system configuration executes the system. However, such static process indicates ineffective execution in the application of mobile bio-information system performing mobile computing. Especially, an inconvenient duty of having to perform initialization of new definition and execution is accompanied during the process configuration of bio-information system and change of method. This study proposes a dynamic process design and execution method to overcome such ineffective process.

  2. Assessment of shielding analysis methods, codes, and data for spent fuel transport/storage applications. [Radiation dose rates from shielded spent fuels and high-level radioactive waste

    Energy Technology Data Exchange (ETDEWEB)

    Parks, C.V.; Broadhead, B.L.; Hermann, O.W.; Tang, J.S.; Cramer, S.N.; Gauthey, J.C.; Kirk, B.L.; Roussin, R.W.

    1988-07-01

    This report provides a preliminary assessment of the computational tools and existing methods used to obtain radiation dose rates from shielded spent nuclear fuel and high-level radioactive waste (HLW). Particular emphasis is placed on analysis tools and techniques applicable to facilities/equipment designed for the transport or storage of spent nuclear fuel or HLW. Applications to cask transport, storage, and facility handling are considered. The report reviews the analytic techniques for generating appropriate radiation sources, evaluating the radiation transport through the shield, and calculating the dose at a desired point or surface exterior to the shield. Discrete ordinates, Monte Carlo, and point kernel methods for evaluating radiation transport are reviewed, along with existing codes and data that utilize these methods. A literature survey was employed to select a cadre of codes and data libraries to be reviewed. The selection process was based on specific criteria presented in the report. Separate summaries were written for several codes (or family of codes) that provided information on the method of solution, limitations and advantages, availability, data access, ease of use, and known accuracy. For each data library, the summary covers the source of the data, applicability of these data, and known verification efforts. Finally, the report discusses the overall status of spent fuel shielding analysis techniques and attempts to illustrate areas where inaccuracy and/or uncertainty exist. The report notes the advantages and limitations of several analysis procedures and illustrates the importance of using adequate cross-section data sets. Additional work is recommended to enable final selection/validation of analysis tools that will best meet the US Department of Energy's requirements for use in developing a viable HLW management system. 188 refs., 16 figs., 27 tabs.

  3. DataSHIELD: taking the analysis to the data, not the data to the analysis

    Science.gov (United States)

    Gaye, Amadou; Marcon, Yannick; Isaeva, Julia; LaFlamme, Philippe; Turner, Andrew; Jones, Elinor M; Minion, Joel; Boyd, Andrew W; Newby, Christopher J; Nuotio, Marja-Liisa; Wilson, Rebecca; Butters, Oliver; Murtagh, Barnaby; Demir, Ipek; Doiron, Dany; Giepmans, Lisette; Wallace, Susan E; Budin-Ljøsne, Isabelle; Oliver Schmidt, Carsten; Boffetta, Paolo; Boniol, Mathieu; Bota, Maria; Carter, Kim W; deKlerk, Nick; Dibben, Chris; Francis, Richard W; Hiekkalinna, Tero; Hveem, Kristian; Kvaløy, Kirsti; Millar, Sean; Perry, Ivan J; Peters, Annette; Phillips, Catherine M; Popham, Frank; Raab, Gillian; Reischl, Eva; Sheehan, Nuala; Waldenberger, Melanie; Perola, Markus; van den Heuvel, Edwin; Macleod, John; Knoppers, Bartha M; Stolk, Ronald P; Fortier, Isabel; Harris, Jennifer R; Woffenbuttel, Bruce HR; Murtagh, Madeleine J; Ferretti, Vincent; Burton, Paul R

    2014-01-01

    Background: Research in modern biomedicine and social science requires sample sizes so large that they can often only be achieved through a pooled co-analysis of data from several studies. But the pooling of information from individuals in a central database that may be queried by researchers raises important ethico-legal questions and can be controversial. In the UK this has been highlighted by recent debate and controversy relating to the UK’s proposed ‘care.data’ initiative, and these issues reflect important societal and professional concerns about privacy, confidentiality and intellectual property. DataSHIELD provides a novel technological solution that can circumvent some of the most basic challenges in facilitating the access of researchers and other healthcare professionals to individual-level data. Methods: Commands are sent from a central analysis computer (AC) to several data computers (DCs) storing the data to be co-analysed. The data sets are analysed simultaneously but in parallel. The separate parallelized analyses are linked by non-disclosive summary statistics and commands transmitted back and forth between the DCs and the AC. This paper describes the technical implementation of DataSHIELD using a modified R statistical environment linked to an Opal database deployed behind the computer firewall of each DC. Analysis is controlled through a standard R environment at the AC. Results: Based on this Opal/R implementation, DataSHIELD is currently used by the Healthy Obese Project and the Environmental Core Project (BioSHaRE-EU) for the federated analysis of 10 data sets across eight European countries, and this illustrates the opportunities and challenges presented by the DataSHIELD approach. Conclusions: DataSHIELD facilitates important research in settings where: (i) a co-analysis of individual-level data from several studies is scientifically necessary but governance restrictions prohibit the release or sharing of some of the required data, and

  4. SNF shipping cask shielding analysis

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, J.O.; Pace, J.V. III

    1996-01-01

    The Waste Management and Remedial Action Division has planned a modification sequence for storage facility 7827 in the Solid Waste Storage Area (SWSA). The modification cycle is: (1) modify an empty caisson, (2) transfer the spent nuclear fuel (SNF) of an occupied caisson to a hot cell in building 3525 for inspection and possible repackaging, and (3) return the package to the modified caisson in the SWSA. Although the SNF to be moved is in the solid form, it has different levels of activity. Thus, the following 5 shipping casks will be available for the task: the Loop Transport Carrier, the In- Pile Loop LITR HB-2 Carrier, the 6.5-inch HRLEL Carrier, the HFIR Hot Scrap Carrier, and the 10-inch ORR Experiment Removal Shield Cask. This report describes the shielding tasks for the 5 casks: determination of shielding characteristics, any streaming avenues, estimation of thermal limits, and shielding calculational uncertainty for use in the transportation plan.

  5. 3th IEEE/ACIS International Conference on Computer and Information Science

    CERN Document Server

    2015-01-01

    This edited book presents scientific results of the 13th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014) which was held on June 4-6, 2014 in Taiyuan, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference.  The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 14 of the conference’s most promis...

  6. Composite Aerogel Multifoil Protective Shielding

    Science.gov (United States)

    Jones, Steven M.

    2013-01-01

    New technologies are needed to survive the temperatures, radiation, and hypervelocity particles that exploration spacecraft encounter. Multilayer insulations (MLIs) have been used on many spacecraft as thermal insulation. Other materials and composites have been used as micrometeorite shielding or radiation shielding. However, no material composite has been developed and employed as a combined thermal insulation, micrometeorite, and radiation shielding. By replacing the scrims that have been used to separate the foil layers in MLIs with various aerogels, and by using a variety of different metal foils, the overall protective performance of MLIs can be greatly expanded to act as thermal insulation, radiation shielding, and hypervelocity particle shielding. Aerogels are highly porous, low-density solids that are produced by the gelation of metal alkoxides and supercritical drying. Aerogels have been flown in NASA missions as a hypervelocity particle capture medium (Stardust) and as thermal insulation (2003 MER). Composite aerogel multifoil protective shielding would be used to provide thermal insulation, while also shielding spacecraft or components from radiation and hypervelocity particle impacts. Multiple layers of foil separated by aerogel would act as a thermal barrier by preventing the transport of heat energy through the composite. The silica aerogel would act as a convective and conductive thermal barrier, while the titania powder and metal foils would absorb and reflect the radiative heat. It would also capture small hypervelocity particles, such as micrometeorites, since it would be a stuffed, multi-shock Whipple shield. The metal foil layers would slow and break up the impacting particles, while the aerogel layers would convert the kinetic energy of the particles to thermal and mechanical energy and stop the particles.

  7. Geological computer modeling and geographic information systems applied to coal data management

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, J.D. [Geological Survey of Canada, Calgary, AB (Canada).

    2001-07-01

    Coalbed methane is an immense Canadian resource. A large amount of subsurface data is available for optimizing exploration before drilling. The construction, visualization, and analysis of computer models to provide consistent protocols for retrieving this information and the application of the geographical information system (GIS) to exploration for coalbed methane are discussed. Some of the applications of the GIS are illustrated. 46 figs.

  8. Information Systems Security and Computer Crime in the IS Curriculum: A Detailed Examination

    Science.gov (United States)

    Foltz, C. Bryan; Renwick, Janet S.

    2011-01-01

    The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little…

  9. Learners' Perceived Information Overload in Online Learning via Computer-Mediated Communication

    Science.gov (United States)

    Chen, Chun-Ying; Pedersen, Susan; Murphy, Karen L.

    2011-01-01

    Many studies report information overload as one of the main problems that students encounter in online learning via computer-mediated communication. This study aimed to explore the sources of online students' information overload and offer suggestions for increasing students' cognitive resources for learning. Participants were 12 graduate students…

  10. Integral Face Shield Concept for Firefighter's Helmet

    Science.gov (United States)

    Abeles, F.; Hansberry, E.; Himel, V.

    1982-01-01

    Stowable face shield could be made integral part of helmet worn by firefighters. Shield, made from same tough clear plastic as removable face shields presently used, would be pivoted at temples to slide up inside helmet when not needed. Stowable face shield, being stored in helmet, is always available, ready for use, and is protected when not being used.

  11. Measuring space radiation shielding effectiveness

    Science.gov (United States)

    Bahadori, Amir; Semones, Edward; Ewert, Michael; Broyan, James; Walker, Steven

    2017-09-01

    Passive radiation shielding is one strategy to mitigate the problem of space radiation exposure. While space vehicles are constructed largely of aluminum, polyethylene has been demonstrated to have superior shielding characteristics for both galactic cosmic rays and solar particle events due to the high hydrogen content. A method to calculate the shielding effectiveness of a material relative to reference material from Bragg peak measurements performed using energetic heavy charged particles is described. Using accelerated alpha particles at the National Aeronautics and Space Administration Space Radiation Laboratory at Brookhaven National Laboratory, the method is applied to sample tiles from the Heat Melt Compactor, which were created by melting material from a simulated astronaut waste stream, consisting of materials such as trash and unconsumed food. The shielding effectiveness calculated from measurements of the Heat Melt Compactor sample tiles is about 10% less than the shielding effectiveness of polyethylene. Shielding material produced from the astronaut waste stream in the form of Heat Melt Compactor tiles is therefore found to be an attractive solution for protection against space radiation.

  12. Measuring space radiation shielding effectiveness

    Directory of Open Access Journals (Sweden)

    Bahadori Amir

    2017-01-01

    Full Text Available Passive radiation shielding is one strategy to mitigate the problem of space radiation exposure. While space vehicles are constructed largely of aluminum, polyethylene has been demonstrated to have superior shielding characteristics for both galactic cosmic rays and solar particle events due to the high hydrogen content. A method to calculate the shielding effectiveness of a material relative to reference material from Bragg peak measurements performed using energetic heavy charged particles is described. Using accelerated alpha particles at the National Aeronautics and Space Administration Space Radiation Laboratory at Brookhaven National Laboratory, the method is applied to sample tiles from the Heat Melt Compactor, which were created by melting material from a simulated astronaut waste stream, consisting of materials such as trash and unconsumed food. The shielding effectiveness calculated from measurements of the Heat Melt Compactor sample tiles is about 10% less than the shielding effectiveness of polyethylene. Shielding material produced from the astronaut waste stream in the form of Heat Melt Compactor tiles is therefore found to be an attractive solution for protection against space radiation.

  13. PubMed on Tap: discovering design principles for online information delivery to handheld computers.

    Science.gov (United States)

    Hauser, Susan E; Demner-Fushman, Dina; Ford, Glenn; Thoma, George R

    2004-01-01

    Online access to biomedical information from handheld computers will be a valuable adjunct to other popular medical applications if information delivery systems are designed with handheld computers in mind. The goal of this project is to discover design principles to facilitate practitioners' access to online medical information at the point-of-care. A prototype system was developed to serve as a testbed for this research. Using the testbed, an initial evaluation has yielded several user interface design principles. Continued research is expected to discover additional user interface design principles as well as guidelines for results organization and system performance

  14. Features of the Synthesis of Performance Security Information in Computer Systems

    Directory of Open Access Journals (Sweden)

    V. K. Dzhogan

    2011-12-01

    Full Text Available Synthesis of a scorecard is a gradual process of composition, since the set of elements that reflect the original, systematized their condition, and, through a series of intermediates, linking them in a single bound to the structure ends with one element that reflects the purpose of the system. The hierarchical structure of the system performance of information security in computer systems is a structure with regard to “one to many”. The article reflects the extent of information security tools capabilities influence at the security of information resources of computer systems (from indirect — Class 1, to direct — Class 4.

  15. Monitoring and Auditing Residual Information on the User’s Computer

    Directory of Open Access Journals (Sweden)

    Vladlena Sergeevna Oladk

    2015-06-01

    Full Text Available This paper considers the problem of violation of information security components such as confidentiality and availability in the event of a computer user's residual information. Analyze the requirements of regulators and mechanisms to be applied in the organization to monitor the residual information or its destruction.Approach to monitoring and auditing residual information on the user's computer, which allows monitoring the residual information in certain areas proposed. Approach allows us to identify the detected information and rank it according to the degree of criticality, as well as calculate the risk of leakage and its potential to develop recommendations aimed at its reduction. The proposed approach is formally described and automated in a software system.

  16. Factors affecting the introduction of Information and Computer Literacy (ICL) courses

    OpenAIRE

    Plomp, T.; Carleer, G.J.

    1986-01-01

    This paper summarizes a survey of Dutch junior secondary schools which was conducted to measure their adoption of the "information and computer literacy" (ICL) concept, and to investigate how far the implementation factors identified by Fullan (1982) are consistent with this innovation. The study's objectives were twofold: (1) to collect baseline information; and (2) to provide policy-makers, innovation planners, and curriculum developers with information about ICL state-of-the-art in the sch...

  17. A ROADMAP FOR A COMPUTATIONAL THEORY OF THE VALUE OF INFORMATION IN ORIGIN OF LIFE QUESTIONS

    Directory of Open Access Journals (Sweden)

    Soumya Banerjee

    2016-06-01

    Full Text Available Information plays a critical role in complex biological systems. Complex systems like immune systems and ant colonies co-ordinate heterogeneous components in a decentralized fashion. How do these distributed decentralized systems function? One key component is how these complex systems efficiently process information. These complex systems have an architecture for integrating and processing information coming in from various sources and points to the value of information in the functioning of different complex biological systems. This article proposes a role for information processing in questions around the origin of life and suggests how computational simulations may yield insights into questions related to the origin of life. Such a computational model of the origin of life would unify thermodynamics with information processing and we would gain an appreciation of why proteins and nucleotides evolved as the substrate of computation and information processing in living systems that we see on Earth. Answers to questions like these may give us insights into non-carbon based forms of life that we could search for outside Earth. We hypothesize that carbon-based life forms are only one amongst a continuum of life-like systems in the universe. Investigations into the role of computational substrates that allow information processing is important and could yield insights into: 1 novel non-carbon based computational substrates that may have “life-like” properties, and 2 how life may have actually originated from non-life on Earth. Life may exist as a continuum between non-life and life and we may have to revise our notion of life and how common it is in the universe. Looking at life or life-like phenomenon through the lens of information theory may yield a broader view of life.

  18. SU-F-E-13: Design and Fabrication of Gynacological Brachytherapy Shielding & Non Shielding Applicators Using Indigenously Developed 3D Printing Machine

    Energy Technology Data Exchange (ETDEWEB)

    Shanmugam, S

    2016-06-15

    Purpose: In this innovative work we have developed Gynecological Brachytherapy shielding & Non Shielding Applicators and compared with the commercially available applicators by using the indigenously developed 3D Printing machine. Methods: We have successfully indigenously developed the 3D printing machine. Which contain the 3 dimensional motion platform, Heater unit, base plate, ect… To fabricate the Gynecological Brachytherapy shielding & non shielding applicators the 3D design were developed in the computer as virtual design. This virtual design is made in a CAD computer file using a 3D modeling program. Separate programme for the shielding & non shielding applicators. We have also provided the extra catheter insert provision in the applicator for the multiple catheter. The DICOM file of the applicator were then converted to stereo Lithography file for the 3D printer. The shielding & Non Shielding Applicators were printed on a indigenously developed 3D printer material. The same dimensions were used to develop the applicators in the acrylic material also for the comparative study. A CT scan was performed to establish an infill-density calibration curve as well as characterize the quality of the print such as uniformity and the infill pattern. To commission the process, basic CT and dose properties of the printing materials were measured in photon beams and compared against water and soft tissue. Applicator were then scanned to confirm the placement of multiple catheter position. Finally dose distributions with rescanned CTs were compared with those computer-generated applicators. Results: The doses measured from the ion Chamber and X-Omat film test were within 2%. The shielded applicator reduce the rectal dose comparatively with the non shielded applicator. Conclusion: As of submission 3 unique cylinders have been designed, printed, and tested dosimetrically. A standardizable workflow for commissioning custom 3D printed applicators was codified and will be

  19. Measuring consumers' information acquisition and decision behavior with the computer-based information-display-matrix

    DEFF Research Database (Denmark)

    Aschemann-Witzel, Jessica; Hamm, Ulrich

    2011-01-01

    The former judgement that the process-tracing method information-display-matrix (IDM) lacks external validity should be questioned in the light of technical advances and changing consumer behaviour. The new research environment offers possibilities for a close-to-realistic refinement and further...... development of the method: starting points are choice of location, increased relevance of choice, individual adjustment of task structure, simplified navigation and realistic layout. Used in multi-measurement-approaches, the IDM can provide detailed background information about consumer information behaviour...... prior to decisions reached in interviews or choice experiments. The contribution introduces to the method and its´ development, use and (dis-)advantages. Results of a survey illustrate the options for analysis and indicate that consumer behaviour in the IDM, compared to face-to-face-interviews, is less...

  20. LINGUISTIC AND INFORMATIONAL SPECIFICS OF COMPUTER-MEDIATED COMMUNICATION: STRUCTURAL ASPECT

    Directory of Open Access Journals (Sweden)

    Barkovich Aleksandr Arkadyevich

    2015-06-01

    Full Text Available The practice of computer-mediated communication is determined by its linguistic content and information format that preconditions syncretic study of computermediated discourse with due regard to its dual nature – linguistic and information. This approach allows consideration of phenomenological foundations of information-dependent speech activity and can be described as linguistic and informational. Modern communication environment is characterized by particular dynamics: system-forming elements and relationships are constantly developing, well-known phenomena and technical capabilities pass on, new ones – emerge. In this regard it is relevant to form a model of sphere, a kind of infrastructure that reflects the underlying system relationships and allows to complete and modify them according to their dynamics. Media and communicational infrastructure characterizes computer-mediated communication on a number of linguistic and informational criteria, acts as a model and forms the basis of categorical metalinguistic apparatus of the sphere with due regard to its functional specifics. Differentiation of communicational relationships using the oppositional potential of the dichotomy 'objectivity – subjectivity' allows to consruct the conceptual framework of computer-mediated communication into a single discursive system of coordinates, avoiding the interference of hyperonyms "environment" and "situation". The linguistic and informational format of computer-mediated communication suggests the importance of linguistic support of relevant practice, in particular, the identification and systematization of discursive regularities.

  1. Mathematical Foundations of Quantum Information and Computation and Its Applications to Nano- and Bio-systems

    CERN Document Server

    Ohya, Masanori

    2011-01-01

    This monograph provides a mathematical foundation  to  the theory of quantum information and computation, with applications to various open systems including nano and bio systems. It includes introductory material on algorithm, functional analysis, probability theory, information theory, quantum mechanics and quantum field theory. Apart from standard material on quantum information like quantum algorithm and teleportation, the authors discuss findings on the theory of entropy in C*-dynamical systems, space-time dependence of quantum entangled states, entangling operators, adaptive dynamics, relativistic quantum information, and a new paradigm for quantum computation beyond the usual quantum Turing machine. Also, some important applications of information theory to genetics and life sciences, as well as recent experimental and theoretical discoveries in quantum photosynthesis are described.

  2. Enhanced radiation shielding with galena concrete

    Directory of Open Access Journals (Sweden)

    Hadad Kamal

    2015-01-01

    Full Text Available A new concrete, containing galena mineral, with enhanced shielding properties for gamma sources is developed. To achieve optimized shielding properties, ten types of galena concrete containing different mixing ratios and a reference normal concrete of 2300 kg/m3 density are studied experimentally and numerically using Monte Carlo and XCOM codes. For building galena concrete, in addition to the main composition, micro-silica and water, galena mineral (containing lead were used. The built samples have high density of 4470 kg/m3 to 5623 kg/m3 and compressive strength of 628 kg/m2 to 685 kg/m2. The half and tenth value layers (half value layer and tenth value layers for the galena concrete, when irradiated with 137Cs gamma source, were found to be 1.45 cm and 4.94 cm, respectively. When irradiated with 60Co gamma source, half value layer was measured to be 2.42 cm. The computation modeling by FLUKA and XCOM shows a good agreement between experimental and computational results.

  3. The Usage of Informal Computer Based Communication in the Context of Organization’s Technological Resources

    Directory of Open Access Journals (Sweden)

    Agota Giedrė Raišienė

    2013-08-01

    Full Text Available Purpose of the article is theoretically and practically analyze the features of informal computer based communication in the context of organization’s technological resources. Methodology—meta analysis, survey and descriptive analysis. Findings. According to scientists, the functions of informal communication cover sharing of work related information, coordination of team activities, spread of organizational culture and feeling of interdependence and affinity. Also, informal communication widens the individuals’ recognition of reality, creates general context of environment between talkers, and strengthens interpersonal attraction. For these reasons, informal communication is desirable and even necessary in organizations because it helps to ensure efficient functioning of the enterprise. However, communicating through electronic channels suppresses informal connections or addresses them to the outside of the organization. So, electronic communication is not beneficial for developing ties in informal organizational network. The empirical research showed, that significant part of courts administration staff is prone to use technological resources of their office for informal communication. Representatives of courts administration choose friends for computer based communication much more often than colleagues (72% and 63%respectively. 93%of the research respondents use an additional e-mail box serviced by commercial providers for non work communication. High intensity of informal electronic communication with friends and familiars shows that workers of court administration are used to meet their psycho emotional needs outside the work place. The survey confirmed conclusion of the theoretical analysis: computer based communication is not beneficial for developing informal contacts between workers. In order for the informal communication could carry out its functions and technological recourses of organization would be used effectively, staff

  4. The Usage of Informal Computer Based Communication in the Context of Organization’s Technological Resources

    Directory of Open Access Journals (Sweden)

    Steponas Jonušauskas

    2011-12-01

    Full Text Available Purpose of the article is theoretically and practically analyze the features of informal computer based communication in the context of organization’s technological resources.Methodology—meta analysis, survey and descriptive analysis.Findings. According to scientists, the functions of informal communication cover sharing of work related information, coordination of team activities, spread of organizational culture and feeling of interdependence and affinity. Also, informal communication widens the individuals’ recognition of reality, creates general context of environment between talkers, and strengthens interpersonal attraction. For these reasons, informal communication is desirable and even necessary in organizations because it helps to ensure efficient functioning of the enterprise. However, communicating through electronic channels suppresses informal connections or addresses them to the outside of the organization. So, electronic communication is not beneficial for developing ties in informal organizational network. The empirical research showed, thatsignificant part of courts administration staff is prone to use technological resources of their office for informal communication. Representatives of courts administration choose friends for computer based communication much more often than colleagues (72% and 63%respectively. 93%of the research respondents use an additional e-mail box serviced by commercial providers for non work communication. High intensity of informal electronic communication with friends and familiars shows that workers of court administration are used to meet their psycho emotional needs outside the work place. The survey confirmed conclusion of the theoretical analysis: computer based communication is not beneficial for developing informal contacts between workers. In order for the informal communication could carry out its functions and technological recourses of organization would be used effectively, staff

  5. Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing

    CERN Document Server

    2013-01-01

    The Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing provides in-depth understanding of the fundamental challenges in the fields of Computational Engineering, Computer, Power Electronics, Instrumentation, Control System, and Telecommunication Technology. This book provides a broad vision for the future of research in these fields with ideas on how to support these new technologies currently practice. Every submitted paper received a careful review from the committee and the final accept/reject decisions were made by the co-chairs on the bases of recommendations from the committee members.

  6. 4th INNS Symposia Series on Computational Intelligence in Information Systems

    CERN Document Server

    Au, Thien

    2015-01-01

    This book constitutes the refereed proceedings of the Fourth International Neural Network Symposia series on Computational Intelligence in Information Systems, INNS-CIIS 2014, held in Bandar Seri Begawan, Brunei in November 2014. INNS-CIIS aims to provide a platform for researchers to exchange the latest ideas and present the most current research advances in general areas related to computational intelligence and its applications in various domains. The 34 revised full papers presented in this book have been carefully reviewed and selected from 72 submissions. They cover a wide range of topics and application areas in computational intelligence and informatics.  

  7. Effects of various radiation source characteristics on shielding requirements at the potential Yucca Mountain repository

    Energy Technology Data Exchange (ETDEWEB)

    Smith, D.W.; Miller, D.D. [Bechtel National, Inc., San Francisco, CA (United States); Hill, R.R. [Sandia National Labs., Albuquerque, NM (United States)

    1992-02-01

    This radiation shielding study provides dose rate information that can be used to estimate required shielding thicknesses for different repository configurations, including various hot cells and vaults in the waste-handling building, the boreholes in the underground emplacement area, and the transfer casks. The study determines gamma and neutron source strengths for various waste types and source geometries representative of conditions at the repository and determines dose rates as a function of shielding thickness for selected materials.

  8. Method and system for determining radiation shielding thickness and gamma-ray energy

    Science.gov (United States)

    Klann, Raymond T.; Vilim, Richard B.; de la Barrera, Sergio

    2015-12-15

    A system and method for determining the shielding thickness of a detected radiation source. The gamma ray spectrum of a radiation detector is utilized to estimate the shielding between the detector and the radiation source. The determination of the shielding may be used to adjust the information from known source-localization techniques to provide improved performance and accuracy of locating the source of radiation.

  9. Conversion of Bibliographic Information to Machine Readable Form Using On-Line Computer Terminals

    Directory of Open Access Journals (Sweden)

    Frederick M. Balfour

    1968-12-01

    Full Text Available A description of the first six months of a project to convert to machine readable form the entire shelf list of the Libraries of the State University of New York at Buffalo. IBM DATATEXT, the on-line computer service which was used for the conversion, provided an upper- and lower-case typewriter which transmitted data to disk storage of a digital computer. Output was a magnetic tape containing bibliographic information tagged in a modified MARC I format. Typists performed all tagging at the console. All information except diacriticals and non-Roman alphabets was converted. Direct costs for the first six months were $.55 per title.

  10. First International Symposium on Applied Computing and Information Technology (ACIT 2013)

    CERN Document Server

    Applied Computing and Information Technology

    2014-01-01

    This book presents the selected results of the 1st International Symposium on Applied Computers and Information Technology (ACIT 2013) held on August 31 – September 4, 2013 in Matsue City, Japan, which brought together researchers, scientists, engineers, industry practitioners, and students to discuss all aspects of  Applied Computers & Information Technology, and its practical challenges. This book includes the best 12 papers presented at the conference, which were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review.  

  11. Radiation Shielding Materials and Containers Incorporating Same

    Energy Technology Data Exchange (ETDEWEB)

    Mirsky, Steven M.; Krill, Stephen J.; and Murray, Alexander P.

    2005-11-01

    An improved radiation shielding material and storage systems for radioactive materials incorporating the same. The PYRolytic Uranium Compound (''PYRUC'') shielding material is preferably formed by heat and/or pressure treatment of a precursor material comprising microspheres of a uranium compound, such as uranium dioxide or uranium carbide, and a suitable binder. The PYRUC shielding material provides improved radiation shielding, thermal characteristic, cost and ease of use in comparison with other shielding materials. The shielding material can be used to form containment systems, container vessels, shielding structures, and containment storage areas, all of which can be used to house radioactive waste. The preferred shielding system is in the form of a container for storage, transportation, and disposal of radioactive waste. In addition, improved methods for preparing uranium dioxide and uranium carbide microspheres for use in the radiation shielding materials are also provided.

  12. Discrepancy between mRNA and protein abundance: insight from information retrieval process in computers.

    Science.gov (United States)

    Wang, Degeng

    2008-12-01

    Discrepancy between the abundance of cognate protein and RNA molecules is frequently observed. A theoretical understanding of this discrepancy remains elusive, and it is frequently described as surprises and/or technical difficulties in the literature. Protein and RNA represent different steps of the multi-stepped cellular genetic information flow process, in which they are dynamically produced and degraded. This paper explores a comparison with a similar process in computers-multi-step information flow from storage level to the execution level. Functional similarities can be found in almost every facet of the retrieval process. Firstly, common architecture is shared, as the ribonome (RNA space) and the proteome (protein space) are functionally similar to the computer primary memory and the computer cache memory, respectively. Secondly, the retrieval process functions, in both systems, to support the operation of dynamic networks-biochemical regulatory networks in cells and, in computers, the virtual networks (of CPU instructions) that the CPU travels through while executing computer programs. Moreover, many regulatory techniques are implemented in computers at each step of the information retrieval process, with a goal of optimizing system performance. Cellular counterparts can be easily identified for these regulatory techniques. In other words, this comparative study attempted to utilize theoretical insight from computer system design principles as catalysis to sketch an integrative view of the gene expression process, that is, how it functions to ensure efficient operation of the overall cellular regulatory network. In context of this bird's-eye view, discrepancy between protein and RNA abundance became a logical observation one would expect. It was suggested that this discrepancy, when interpreted in the context of system operation, serves as a potential source of information to decipher regulatory logics underneath biochemical network operation.

  13. Underutilization of information and knowledge in everyday medical practice: Evaluation of a computer-based solution

    Directory of Open Access Journals (Sweden)

    Fritz Peter

    2008-11-01

    Full Text Available Abstract Background The medical history is acknowledged as the sine qua non for quality medical care because recognizing problems is pre-requisite for managing them. Medical histories typically are incomplete and inaccurate, however. We show here that computers are a solution to this issue of information gathering about patients. Computers can be programmed to acquire more complete medical histories with greater detail across a range of acute and chronic issues than physician histories. Methods Histories were acquired by physicians in the usual way and by a computer program interacting directly with patients. Decision-making of what medical issues were queried by computer were made internally by the software, including determination of the chief complaint. The selection of patients was from admissions to the Robert-Bosch-Hospital, Stuttgart, Germany by convenience sampling. Physician-acquired and computer-acquired histories were compared on a patient-by-patient basis for 45 patients. Results The computer histories reported 160 problems not recorded in physician histories or slightly more than 3.5 problems per patient. However, physicians but not the computer reported 13 problems. The data show that computer histories reported problems across a range of organ systems, that the problems detected by computer but not physician histories were both acute and chronic and that the computer histories detected a significant number of issues important for preventing further morbidity. Conclusion A combination of physician and computer-acquired histories, in non-emergent situations, with the latter available to the physician at the time he or she sees the patient, is a far superior method for collecting historical data than the physician interview alone.

  14. Gender Differences in Computer and Information Literacy: An Exploration of the Performances of Girls and Boys in ICILS 2013

    Science.gov (United States)

    Punter, R. Annemiek; Meelissen, Martina R. M.; Glas, Cees A. W.

    2017-01-01

    IEA's International Computer and Information Literacy Study (ICILS) 2013 showed that in the majority of the participating countries, 14-year-old girls outperformed boys in computer and information literacy (CIL): results that seem to contrast with the common view of boys having better computer skills. This study used the ICILS data to explore…

  15. Gender differences in computer and information literacy: An exploration of the performances of girls and boys in ICILS 2013

    NARCIS (Netherlands)

    Punter, Renate Annemiek; Meelissen, Martina R.M.; Glas, Cornelis A.W.

    2017-01-01

    IEA’s International Computer and Information Literacy Study (ICILS) 2013 showed that in the majority of the participating countries, 14-year-old girls outperformed boys in computer and information literacy (CIL): results that seem to contrast with the common view of boys having better computer

  16. 5 CFR Appendix A to Subpart H of... - Information on Computing Certain Common Deductions From Back Pay Awards

    Science.gov (United States)

    2010-01-01

    ... interest or applying any offset or deduction. (c) Social Security (OASDI) and Medicare taxes Compute the... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Information on Computing Certain Common.... A Appendix A to Subpart H of Part 550—Information on Computing Certain Common Deductions From Back...

  17. Efficient computation of discounted asymmetric information zero-sum stochastic games

    KAUST Repository

    Li, Lichun

    2015-12-15

    In asymmetric information zero-sum games, one player has superior information about the game over the other. Asymmetric information games are particularly relevant for security problems, e.g., where an attacker knows its own skill set or alternatively a system administrator knows the state of its resources. In such settings, the informed player is faced with the tradeoff of exploiting its superior information at the cost of revealing its superior information. This tradeoff is typically addressed through randomization, in an effort to keep the uninformed player informationally off balance. A lingering issue is the explicit computation of such strategies. This paper, building on prior work for repeated games, presents an LP formulation to compute suboptimal strategies for the informed player in discounted asymmetric information stochastic games in which state transitions are not affected by the uninformed player. Furthermore, the paper presents bounds between the security level guaranteed by the sub-optimal strategy and the optimal value. The results are illustrated on a stochastic intrusion detection problem.

  18. Development of Student Information Management System based on Cloud Computing Platform

    Directory of Open Access Journals (Sweden)

    Ibrahim A. ALAMERI

    2017-10-01

    Full Text Available The management and provision of information about the educational process is an essential part of effective management of the educational process in the institutes of higher education. In this paper the requirements of a reliable student management system are analyzed, formed a use-case model of student information management system, designed and implemented the architecture of the application. Regarding the implementation process, modern approaches were used to develop and deploy a reliable online application in cloud computing environments specifically.

  19. Design of orbital debris shields for oblique hypervelocity impact

    Science.gov (United States)

    Fahrenthold, Eric P.

    1994-01-01

    A new impact debris propagation code was written to link CTH simulations of space debris shield perforation to the Lagrangian finite element code DYNA3D, for space structure wall impact simulations. This software (DC3D) simulates debris cloud evolution using a nonlinear elastic-plastic deformable particle dynamics model, and renders computationally tractable the supercomputer simulation of oblique impacts on Whipple shield protected structures. Comparison of three dimensional, oblique impact simulations with experimental data shows good agreement over a range of velocities of interest in the design of orbital debris shielding. Source code developed during this research is provided on the enclosed floppy disk. An abstract based on the work described was submitted to the 1994 Hypervelocity Impact Symposium.

  20. International Space Station (ISS) Meteoroid/Orbital Debris Shielding

    Science.gov (United States)

    Christiansen, Eric L.

    1999-01-01

    Design practices to provide protection for International Space Station (ISS) crew and critical equipment from meteoroid and orbital debris (M/OD) Impacts have been developed. Damage modes and failure criteria are defined for each spacecraft system. Hypervolocity Impact -1 - and analyses are used to develop ballistic limit equations (BLEs) for each exposed spacecraft system. BLEs define Impact particle sizes that result in threshold failure of a particular spacecraft system as a function of Impact velocity, angles and particle density. The BUMPER computer code Is used to determine the probability of no penetration (PNP) that falls the spacecraft shielding based on NASA standard meteoroid/debris models, a spacecraft geometry model, and the BLEs. BUMPER results are used to verify spacecraft shielding requirements Low-weight, high-performance shielding alternatives have been developed at the NASA Johnson Space Center (JSC) Hypervelocity Impact Technology Facility (HITF) to meet spacecraft protection requirements.

  1. Analysis of the Health Information and Communication System and Cloud Computing

    Directory of Open Access Journals (Sweden)

    Matija Varga

    2015-05-01

    Full Text Available This paper describes an analysis and shows its use in analysing strengths, weaknesses, opportunities and threats (risks within the health care system.The aim is further more to show strengths, weaknesses, opportunities and threats when using cloud computing in the health care system. Cloud computing in medicine is an integral part of telemedicine. Based on the information presented in this paper, employees may identify the advantages and disadvantages of using cloud computing. When introducing new information technologies in the health care business the implementers will encounter numerous problems, such as: the complexity of the existing and the new information system, the costs of maintaining and updating the software, the cost of implementing new modules,a way of protecting the existing data in the database and the data that will be collected in the diagnosis. Using the SWOT analysis this paper evaluates the feasibility and possibility of adopting cloud computing in the health sector to improve health services based on samples (examples from abroad. The intent of cloud computing in medicine is to send data of the patient to the doctor instead of the patient sending it himself/herself.

  2. A new computational strategy for identifying essential proteins based on network topological properties and biological information.

    Science.gov (United States)

    Qin, Chao; Sun, Yongqi; Dong, Yadong

    2017-01-01

    Essential proteins are the proteins that are indispensable to the survival and development of an organism. Deleting a single essential protein will cause lethality or infertility. Identifying and analysing essential proteins are key to understanding the molecular mechanisms of living cells. There are two types of methods for predicting essential proteins: experimental methods, which require considerable time and resources, and computational methods, which overcome the shortcomings of experimental methods. However, the prediction accuracy of computational methods for essential proteins requires further improvement. In this paper, we propose a new computational strategy named CoTB for identifying essential proteins based on a combination of topological properties, subcellular localization information and orthologous protein information. First, we introduce several topological properties of the protein-protein interaction (PPI) network. Second, we propose new methods for measuring orthologous information and subcellular localization and a new computational strategy that uses a random forest prediction model to obtain a probability score for the proteins being essential. Finally, we conduct experiments on four different Saccharomyces cerevisiae datasets. The experimental results demonstrate that our strategy for identifying essential proteins outperforms traditional computational methods and the most recently developed method, SON. In particular, our strategy improves the prediction accuracy to 89, 78, 79, and 85 percent on the YDIP, YMIPS, YMBD and YHQ datasets at the top 100 level, respectively.

  3. Long-term changes of information environments and computer anxiety of nurse administrators in Japan.

    Science.gov (United States)

    Majima, Yukie; Izumi, Takako

    2013-01-01

    In Japan, medical information systems, including electronic medical records, are being introduced increasingly at medical and nursing fields. Nurse administrators, who are involved in the introduction of medical information systems and who must make proper judgment, are particularly required to have at least minimal knowledge of computers and networks and the ability to think about easy-to-use medical information systems. However, few of the current generation of nurse administrators studied information science subjects in their basic education curriculum. It can be said that information education for nurse administrators has become a pressing issue. Consequently, in this study, we conducted a survey of participants taking the first level program of the education course for Japanese certified nurse administrators to ascertain the actual conditions, such as the information environments that nurse administrators are in, their anxiety attitude to computers. Comparisons over the seven years since 2004 revealed that although introduction of electronic medical records in hospitals was progressing, little change in attributes of participants taking the course was observed, such as computer anxiety.

  4. Informed public choices for low-carbon electricity portfolios using a computer decision tool.

    Science.gov (United States)

    Mayer, Lauren A Fleishman; Bruine de Bruin, Wändi; Morgan, M Granger

    2014-04-01

    Reducing CO2 emissions from the electricity sector will likely require policies that encourage the widespread deployment of a diverse mix of low-carbon electricity generation technologies. Public discourse informs such policies. To make informed decisions and to productively engage in public discourse, citizens need to understand the trade-offs between electricity technologies proposed for widespread deployment. Building on previous paper-and-pencil studies, we developed a computer tool that aimed to help nonexperts make informed decisions about the challenges faced in achieving a low-carbon energy future. We report on an initial usability study of this interactive computer tool. After providing participants with comparative and balanced information about 10 electricity technologies, we asked them to design a low-carbon electricity portfolio. Participants used the interactive computer tool, which constrained portfolio designs to be realistic and yield low CO2 emissions. As they changed their portfolios, the tool updated information about projected CO2 emissions, electricity costs, and specific environmental impacts. As in the previous paper-and-pencil studies, most participants designed diverse portfolios that included energy efficiency, nuclear, coal with carbon capture and sequestration, natural gas, and wind. Our results suggest that participants understood the tool and used it consistently. The tool may be downloaded from http://cedmcenter.org/tools-for-cedm/informing-the-public-about-low-carbon-technologies/ .

  5. 12th ACIS/IEEE International Conference on Computer Science and Information Science

    CERN Document Server

    2013-01-01

    This edited book presents scientific results of the 12th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2013) which was held on June 16-20, 2013 in Toki Messe, Niigata, Japan. The aim of this conference was to bring together scientists, engineers, computer users, and students to share their experiences and exchange new ideas, research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them The conference organizers selected the best 20 papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review.    

  6. THE STATUS OF INFORMATION SECURITY COMPETENCE FORMEDNESS OF FUTURE COMPUTER SCIENCE TEACHERS

    Directory of Open Access Journals (Sweden)

    Vasyl P. Oleksiuk

    2017-12-01

    Full Text Available In the article there are explored the concepts of cybersecurity and information security. It is proved that cybersecurity can’t be fully ensured without teaching to principles and rules of information security. The authors have analyzed the specificity of the future computer science teachers' study in the context of developing of their competences necessary for safe students’ activity in the computer networks and Internet. Particular attention is paid to the threats arising after introduction cloud technologies various service models into the educational process. The article focuses on methods and stages of the pedagogical investigation of correlation between the operational and reflective components of the professional competencies of future computer science teachers.

  7. A précis of philosophy of computing and information technology

    NARCIS (Netherlands)

    Brey, Philip A.E.; Soraker, Johnny

    2009-01-01

    The authors recently finished a comprehensive chapter on “Philosophy of Computing and Information Technology” for the forthcoming (fall 2009) Philosophy of Technology and Engineering Sciences (Ed.: A. Meijers), Volume IX in the Elsevier series Handbook of the Philosophy of Science (Eds.: D. Gabbay,

  8. A Coding System for Qualitative Studies of the Information-Seeking Process in Computer Science Research

    Science.gov (United States)

    Moral, Cristian; de Antonio, Angelica; Ferre, Xavier; Lara, Graciela

    2015-01-01

    Introduction: In this article we propose a qualitative analysis tool--a coding system--that can support the formalisation of the information-seeking process in a specific field: research in computer science. Method: In order to elaborate the coding system, we have conducted a set of qualitative studies, more specifically a focus group and some…

  9. Factors affecting the introduction of Information and Computer Literacy (ICL) courses

    NARCIS (Netherlands)

    Plomp, T.; Carleer, G.J.

    1986-01-01

    This paper summarizes a survey of Dutch junior secondary schools which was conducted to measure their adoption of the "information and computer literacy" (ICL) concept, and to investigate how far the implementation factors identified by Fullan (1982) are consistent with this innovation. The study's

  10. Assessment of the Accounting and Joint Accounting/Computer Information Systems Programs.

    Science.gov (United States)

    Appiah, John; Cernigliaro, James; Davis, Jeffrey; Gordon, Millicent; Richards, Yves; Santamaria, Fernando; Siegel, Annette; Lytle, Namy; Wharton, Patrick

    This document presents City University of New York LaGuardia Community College's Department of Accounting and Managerial Studies assessment of its accounting and joint accounting/computer information systems programs report, and includes the following items: (1) description of the mission and goals of the Department of Accounting and Managerial…

  11. Facilitating Place-Based Learning in Outdoor Informal Environments with Mobile Computers

    Science.gov (United States)

    Zimmerman, Heather Toomey; Land, Susan M.

    2014-01-01

    This paper advocates for place-based education to guide research and design for mobile computers used in outdoor informal environments (e.g., backyards, nature centers and parks). By bringing together research on place-based education with research on location awareness, we developed three design guidelines to support learners to develop robust…

  12. Computation of the Exact Information Matrix of Gaussian Dynamic Regression Time Series Models

    NARCIS (Netherlands)

    Klein, A.A.B.; Melard, G.; Zahaf, T.

    1998-01-01

    In this paper, the computation of the exact Fisher information matrix of a large class of Gaussian time series models is considered. This class, which is often called the single-input-single-output (SISO) model, includes dynamic regression with autocorrelated errors and the transfer function model,

  13. The Relationship between Chief Information Officer Transformational Leadership and Computing Platform Operating Systems

    Science.gov (United States)

    Anderson, George W.

    2010-01-01

    The purpose of this study was to relate the strength of Chief Information Officer (CIO) transformational leadership behaviors to 1 of 5 computing platform operating systems (OSs) that may be selected for a firm's Enterprise Resource Planning (ERP) business system. Research shows executive leader behaviors may promote innovation through the use of…

  14. Assessing Information-Seeking Behavior of Computer Science and Engineering Faculty

    Science.gov (United States)

    Tucci, Valerie K.

    2011-01-01

    This study, the first phase of a multi-phase effort, was undertaken to assess and provide for the information needs of the Faculty of the Schools of Science and Engineering at The College of New Jersey (TCNJ) in the digital age. The objectives of this phase were to: 1) gain an in-depth understanding of how computer science and engineering faculty…

  15. Information Technology in project-organized electronic and computer technology engineering education

    DEFF Research Database (Denmark)

    Nielsen, Kirsten Mølgaard; Nielsen, Jens Frederik Dalsgaard

    1999-01-01

    This paper describes the integration of IT in the education of electronic and computer technology engineers at Institute of Electronic Systems, Aalborg Uni-versity, Denmark. At the Institute Information Technology is an important tool in the aspects of the education as well as for communication...

  16. Addressing the 21st Century Paradox: Integrating Entrepreneurship in the Computer Information Systems Curriculum

    Science.gov (United States)

    Lang, Guido; Babb, Jeffry

    2015-01-01

    The Computer Information Systems (CIS) discipline faces an identity crisis: although demand for CIS graduates is growing, student enrollment is either in decline, or is at least soft or flat in many cases. This has been referred to as the 21st century paradox. As one solution to this problem, we propose to integrate entrepreneurship in the CIS…

  17. Attention Paid to Feedback Provided by a Computer-Based Assessment for Learning on Information Literacy

    Science.gov (United States)

    Timmers, Caroline; Veldkamp, Bernard

    2011-01-01

    Three studies are presented on attention paid to feedback provided by a computer-based assessment for learning on information literacy. Results show that the attention paid to feedback varies greatly. In general the attention focuses on feedback of incorrectly answered questions. In each study approximately fifty percent of the respondents paid…

  18. Computer Security in the Introductory Business Information Systems Course: An Exploratory Study of Textbook Coverage

    Science.gov (United States)

    Sousa, Kenneth J.; MacDonald, Laurie E.; Fougere, Kenneth T.

    2005-01-01

    The authors conducted an evaluation of Management Information Systems (MIS) textbooks and found that computer security receives very little in-depth coverage. The textbooks provide, at best, superficial treatment of security issues. The research results suggest that MIS faculty need to provide material to supplement the textbook to provide…

  19. 78 FR 64255 - Advisory Committee for Computer and Information Science and Engineering; Cancellation of Meeting

    Science.gov (United States)

    2013-10-28

    ... From the Federal Register Online via the Government Publishing Office NATIONAL SCIENCE FOUNDATION Advisory Committee for Computer and Information Science and Engineering; Cancellation of Meeting SUMMARY: As a result of the impact of the recent government shutdown, the National Science Foundation is...

  20. Concurrent computation of connected pattern spectra for very large image information mining

    NARCIS (Netherlands)

    Wilkinson, Michael; Moschini, Ugo; Ouzounis, G.K.; Pesaresi, M.

    2012-01-01

    This paper presents a shared-memory parallel algorithm for computing connected pattern spectra from the Max-Tree structure. The pattern spectrum is an aggregated feature space derived directly from the tree-based image representation and is a powerful tool for interactive image information mining.

  1. A Latency-Tolerant Partitioner for Distributed Computing on the Information Power Grid

    Science.gov (United States)

    Das, Sajal K.; Harvey, Daniel J.; Biwas, Rupak; Kwak, Dochan (Technical Monitor)

    2001-01-01

    NASA's Information Power Grid (IPG) is an infrastructure designed to harness the power of graphically distributed computers, databases, and human expertise, in order to solve large-scale realistic computational problems. This type of a meta-computing environment is necessary to present a unified virtual machine to application developers that hides the intricacies of a highly heterogeneous environment and yet maintains adequate security. In this paper, we present a novel partitioning scheme. called MinEX, that dynamically balances processor workloads while minimizing data movement and runtime communication, for applications that are executed in a parallel distributed fashion on the IPG. We also analyze the conditions that are required for the IPG to be an effective tool for such distributed computations. Our results show that MinEX is a viable load balancer provided the nodes of the IPG are connected by a high-speed asynchronous interconnection network.

  2. Finnish physicians' experiences with computer-supported patient information exchange and communication in clinical work.

    Science.gov (United States)

    Viitanen, Johanna; Nieminen, Marko; Hypponen, Hannele; Laaveri, Tinja

    2011-01-01

    Several researchers share the concern of healthcare information systems failing to support communication and collaboration in clinical practices. The objective of this paper is to investigate the current state of computer-supported patient information exchange and associated communication between clinicians. We report findings from a national survey on Finnish physicians? experiences with their currently used clinical information systems with regard to patient information documentation, retrieval, management and exchange-related tasks. The questionnaire study with 3929 physicians indicated the main concern being cross-organisational patient information delivery. In addition, physicians argued computer usage increasingly steals time and attention from caring activities and even disturbs physician?nurse collaboration. Problems in information management were particularly emphasised among those physicians working in hospitals and wards. The survey findings indicated that collaborative applications and mobile or wireless solutions have not been widely adapted in Finnish healthcare and suggested an urgent need for adopting appropriate information and communication technology applications to support information exchange and communication between physicians, and physicians and nurses.

  3. Evolutionary Game Analysis of Competitive Information Dissemination on Social Networks: An Agent-Based Computational Approach

    Directory of Open Access Journals (Sweden)

    Qing Sun

    2015-01-01

    Full Text Available Social networks are formed by individuals, in which personalities, utility functions, and interaction rules are made as close to reality as possible. Taking the competitive product-related information as a case, we proposed a game-theoretic model for competitive information dissemination in social networks. The model is presented to explain how human factors impact competitive information dissemination which is described as the dynamic of a coordination game and players’ payoff is defined by a utility function. Then we design a computational system that integrates the agent, the evolutionary game, and the social network. The approach can help to visualize the evolution of % of competitive information adoption and diffusion, grasp the dynamic evolution features in information adoption game over time, and explore microlevel interactions among users in different network structure under various scenarios. We discuss several scenarios to analyze the influence of several factors on the dissemination of competitive information, ranging from personality of individuals to structure of networks.

  4. Comparative analysis of the radiation shield effect in an abdominal CT scan

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Seon-Chil; Kim, Young-Jae [Daegu Health College, Daegu (Korea, Republic of); Lee, Joon-Seok [Daegu Fatima Hospital, Daegu (Korea, Republic of); Dong, Kyung-Rae [Gwangju Health University, Gwangju (Korea, Republic of); Chosun University, Gwangju (Korea, Republic of); Chung, Woon-Kwan [Chosun University, Gwangju (Korea, Republic of); Lim, Chang-Seon [Konyang University, Daejeon (Korea, Republic of)

    2014-03-15

    This study measured and compared the dose on the eyeballs and the thyroid with and without the use of a shield by applying the abdominal examination protocol used in an actual examination to a 64-channel computed tomography (CT) scan. A dummy phantom manufactured from acryl was used to measure the dose to the eyeballs and the thyroid of a patient during a thoraco-abdominal CT scan. The dose was measured using three dosimeters (optically-stimulated luminescence dosimeter (OSLD), thermoluminescence dosimeter (TLD) and photoluminescence dosimeter (PLD)) attached to the surfaces of three parts (left and right eyeballs and thyroid) in a phantom with and without the use of a shield for the eyeballs and the thyroid. Two types of shields (1-mm barium shielding sheet and 1-mm tungsten shielding sheet) were used for the measurements. The goggles and the lead shield, which are normally used in clinical practice, were used to compare the shield ratios of the shields. According to the results of the measurements made by using the OSLD, the shield ratios of the barium and the tungsten sheets were in the range of 34 - 36%. The measurements made by using the TLD showed that the shield ratio of the barium sheet was 6.25% higher than that of the tungsten sheet. When the PLD was used for the measurement, the shield ratio of the barium sheet was 33.34%, which was equivalent to that of the tungsten sheet. These results confirmed that the cheap barium sheet had a better shielding effect than the expensive tungsten sheet.

  5. In the Clouds: The Implications of Cloud Computing for Higher Education Information Technology Governance and Decision Making

    Science.gov (United States)

    Dulaney, Malik H.

    2013-01-01

    Emerging technologies challenge the management of information technology in organizations. Paradigm changing technologies, such as cloud computing, have the ability to reverse the norms in organizational management, decision making, and information technology governance. This study explores the effects of cloud computing on information technology…

  6. Computing the trajectory mutual information between a point process and an analog stochastic process.

    Science.gov (United States)

    Pasha, Syed Ahmed; Solo, Victor

    2012-01-01

    In a number of application areas such as neural coding there is interest in computing, from real data, the information flows between stochastic processes one of which is a point process. Of particular interest is the calculation of the trajectory (as opposed to marginal) mutual information between an observed point process which is influenced by an underlying but unobserved analog stochastic process i.e. a state. Using particle filtering we develop a model based trajectory mutual information calculation for apparently the first time.

  7. Information Technology Management System: an Analysis on Computational Model Failures for Fleet Management

    Directory of Open Access Journals (Sweden)

    Jayr Figueiredo de Oliveira

    2013-10-01

    Full Text Available This article proposes an information technology model to evaluate fleet management failure. Qualitative research done by a case study within an Interstate Transport company in a São Paulo State proposed to establish a relationship between computer tools and valid trustworthy information needs, and within an acceptable timeframe, for decision making, reliability, availability and system management. Additionally, the study aimed to provide relevant and precise information, in order to minimize and mitigate failure actions that may occur, compromising all operational organization base functioning.

  8. Learners' perceived information overload in online learning via computer-mediated communication

    Directory of Open Access Journals (Sweden)

    Karen L. Murphy

    2011-12-01

    Full Text Available Many studies report information overload as one of the main problems that students encounter in online learning via computer-mediated communication. This study aimed to explore the sources of online students' information overload and offer suggestions for increasing students' cognitive resources for learning. Participants were 12 graduate students from two online courses in the United States. Their learning experiences in both online discussions and on the course website were explored through semi-structured interviews. They also completed a background questionnaire that assessed three constructs that limit learner readiness and are likely to lead to online students' perceived information overload: inadequate prior knowledge, inadequate English proficiency, and lack of technical skills for participating in computer-mediated communications. The findings suggest that varied learner characteristics led some students to be more susceptible than others to information overload. Emerging data-driven risk factors were: lack of efficiency in reading from computer screens, visual and auditory learning preferences, and time constraints. Difficulties associated with students' perceptions of information overload are addressed and implications for course design are offered.

  9. A Novel Radiation Shielding Material Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Radiation shielding simulations showed that epoxy loaded with 10-70% polyethylene would be an excellent shielding material against GCRs and SEPs. Milling produced an...

  10. System of Information in Conceptual Maps for students of Computer Engineering.

    Directory of Open Access Journals (Sweden)

    Lydia Rosa Ríos Rodríguez

    2014-06-01

    Full Text Available The university students, in their daily activities make some decisions which contribute in their professional formation; in many occasions they don't have the enough help to make it in the best way. The systems of information constitute an important alternative to take into consideration in these cases. This work refers to the experience of the department of Computer Engineering of the University of Sancti Spíritus José Martí Pérez (UNISS in the conception and creation of a system of information for the students of the career Computer Engineering on the discipline Artificial Intelligence which uses the conceptual maps as form of representing the information.

  11. MicroShield/ISOCS gamma modeling comparison.

    Energy Technology Data Exchange (ETDEWEB)

    Sansone, Kenneth R

    2013-08-01

    Quantitative radiological analysis attempts to determine the quantity of activity or concentration of specific radionuclide(s) in a sample. Based upon the certified standards that are used to calibrate gamma spectral detectors, geometric similarities between sample shape and the calibration standards determine if the analysis results developed are qualitative or quantitative. A sample analyzed that does not mimic a calibrated sample geometry must be reported as a non-standard geometry and thus the results are considered qualitative and not quantitative. MicroShieldR or ISOCSR calibration software can be used to model non-standard geometric sample shapes in an effort to obtain a quantitative analytical result. MicroShieldR and Canberras ISOCSR software contain several geometry templates that can provide accurate quantitative modeling for a variety of sample configurations. Included in the software are computational algorithms that are used to develop and calculate energy efficiency values for the modeled sample geometry which can then be used with conventional analysis methodology to calculate the result. The response of the analytical method and the sensitivity of the mechanical and electronic equipment to the radionuclide of interest must be calibrated, or standardized, using a calibrated radiological source that contains a known and certified amount of activity.

  12. Discussion on variance reduction technique for shielding

    Energy Technology Data Exchange (ETDEWEB)

    Maekawa, Fujio [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    1998-03-01

    As the task of the engineering design activity of the international thermonuclear fusion experimental reactor (ITER), on 316 type stainless steel (SS316) and the compound system of SS316 and water, the shielding experiment using the D-T neutron source of FNS in Japan Atomic Energy Research Institute has been carried out. However, in these analyses, enormous working time and computing time were required for determining the Weight Window parameter. Limitation or complication was felt when the variance reduction by Weight Window method of MCNP code was carried out. For the purpose of avoiding this difficulty, investigation was performed on the effectiveness of the variance reduction by cell importance method. The conditions of calculation in all cases are shown. As the results, the distribution of fractional standard deviation (FSD) related to neutrons and gamma-ray flux in the direction of shield depth is reported. There is the optimal importance change, and when importance was increased at the same rate as that of the attenuation of neutron or gamma-ray flux, the optimal variance reduction can be done. (K.I.)

  13. Pattern-information analysis: from stimulus decoding to computational-model testing.

    Science.gov (United States)

    Kriegeskorte, Nikolaus

    2011-05-15

    Pattern-information analysis has become an important new paradigm in functional imaging. Here I review and compare existing approaches with a focus on the question of what we can learn from them in terms of brain theory. The most popular and widespread method is stimulus decoding by response-pattern classification. This approach addresses the question whether activity patterns in a given region carry information about the stimulus category. Pattern classification uses generic models of the stimulus-response relationship that do not mimic brain information processing and treats the stimulus space as categorical-a simplification that is often helpful, but also limiting in terms of the questions that can be addressed. We can address the question whether representations are consistent across different stimulus sets or tasks by cross-decoding, where the classifier is trained with one set of stimuli (or task) and tested with another. Beyond pattern classification, a major new direction is the integration of computational models of brain information processing into pattern-information analysis. This approach enables us to address the question to what extent competing computational models are consistent with the stimulus representations in a brain region. Two methods that test computational models are voxel receptive-field modeling and representational similarity analysis. These methods sample the stimulus (or mental-state) space more richly, estimate a separate response pattern for each stimulus, and can generalize from the stimulus sample to a stimulus population. Computational models that mimic brain information processing predict responses from stimuli. The reverse transform can be modeled to reconstruct stimuli from responses. Stimulus reconstruction is a challenging feat of engineering, but the implications of the results for brain theory are not always clear. Exploratory pattern analyses complement the confirmatory approaches mentioned so far and can reveal strong

  14. CRYSNET manual. Informal report. [Hardware and software of crystallographic computing network

    Energy Technology Data Exchange (ETDEWEB)

    None,

    1976-07-01

    This manual describes the hardware and software which together make up the crystallographic computing network (CRYSNET). The manual is intended as a users' guide and also provides general information for persons without any experience with the system. CRYSNET is a network of intelligent remote graphics terminals that are used to communicate with the CDC Cyber 70/76 computing system at the Brookhaven National Laboratory (BNL) Central Scientific Computing Facility. Terminals are in active use by four research groups in the field of crystallography. A protein data bank has been established at BNL to store in machine-readable form atomic coordinates and other crystallographic data for macromolecules. The bank currently includes data for more than 20 proteins. This structural information can be accessed at BNL directly by the CRYSNET graphics terminals. More than two years of experience has been accumulated with CRYSNET. During this period, it has been demonstrated that the terminals, which provide access to a large, fast third-generation computer, plus stand-alone interactive graphics capability, are useful for computations in crystallography, and in a variety of other applications as well. The terminal hardware, the actual operations of the terminals, and the operations of the BNL Central Facility are described in some detail, and documentation of the terminal and central-site software is given. (RWR)

  15. Information Technology Service Management with Cloud Computing Approach to Improve Administration System and Online Learning Performance

    Directory of Open Access Journals (Sweden)

    Wilianto Wilianto

    2015-10-01

    Full Text Available This work discusses the development of information technology service management using cloud computing approach to improve the performance of administration system and online learning at STMIK IBBI Medan, Indonesia. The network topology is modeled and simulated for system administration and online learning. The same network topology is developed in cloud computing using Amazon AWS architecture. The model is designed and modeled using Riverbed Academic Edition Modeler to obtain values of the parameters: delay, load, CPU utilization, and throughput. The simu- lation results are the following. For network topology 1, without cloud computing, the average delay is 54  ms, load 110 000 bits/s, CPU utilization 1.1%, and throughput 440  bits/s.  With  cloud  computing,  the  average  delay  is 45 ms,  load  2 800  bits/s,  CPU  utilization  0.03%,  and throughput 540 bits/s. For network topology 2, without cloud computing, the average delay is 39  ms, load 3 500 bits/s, CPU utilization 0.02%, and throughput database server 1 400 bits/s. With cloud computing, the average delay is 26 ms, load 5 400 bits/s, CPU utilization email server 0.0001%, FTP server 0.001%, HTTP server 0.0002%, throughput email server 85 bits/s, FTP    server 100 bits/sec, and HTTP server 95  bits/s.  Thus,  the  delay, the load, and the CPU utilization decrease; but,  the throughput increases. Information technology service management with cloud computing approach has better performance.

  16. WAVS radiation shielding references and assumptions

    Energy Technology Data Exchange (ETDEWEB)

    McLean, Adam [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-10-07

    At ITER, the confluence of a high radiation environment and the requirement for high performance imaging for plasma and plasma-facing surface diagnosis will necessitate extensive application of radiation shielding. Recommended here is a dual-layer shield design composed of lead for gamma attenuation, surrounded by a fire-resistant polyehtylene doped with a thermal neutron absorber for neutron shielding.

  17. Knowledge management: Role of the the Radiation Safety Information Computational Center (RSICC)

    Science.gov (United States)

    Valentine, Timothy

    2017-09-01

    The Radiation Safety Information Computational Center (RSICC) at Oak Ridge National Laboratory (ORNL) is an information analysis center that collects, archives, evaluates, synthesizes and distributes information, data and codes that are used in various nuclear technology applications. RSICC retains more than 2,000 software packages that have been provided by code developers from various federal and international agencies. RSICC's customers (scientists, engineers, and students from around the world) obtain access to such computing codes (source and/or executable versions) and processed nuclear data files to promote on-going research, to ensure nuclear and radiological safety, and to advance nuclear technology. The role of such information analysis centers is critical for supporting and sustaining nuclear education and training programs both domestically and internationally, as the majority of RSICC's customers are students attending U.S. universities. Additionally, RSICC operates a secure CLOUD computing system to provide access to sensitive export-controlled modeling and simulation (M&S) tools that support both domestic and international activities. This presentation will provide a general review of RSICC's activities, services, and systems that support knowledge management and education and training in the nuclear field.

  18. Turning text into research networks: information retrieval and computational ontologies in the creation of scientific databases.

    Science.gov (United States)

    Ceci, Flávio; Pietrobon, Ricardo; Gonçalves, Alexandre Leopoldo

    2012-01-01

    Web-based, free-text documents on science and technology have been increasing growing on the web. However, most of these documents are not immediately processable by computers slowing down the acquisition of useful information. Computational ontologies might represent a possible solution by enabling semantically machine readable data sets. But, the process of ontology creation, instantiation and maintenance is still based on manual methodologies and thus time and cost intensive. We focused on a large corpus containing information on researchers, research fields, and institutions. We based our strategy on traditional entity recognition, social computing and correlation. We devised a semi automatic approach for the recognition, correlation and extraction of named entities and relations from textual documents which are then used to create, instantiate, and maintain an ontology. We present a prototype demonstrating the applicability of the proposed strategy, along with a case study describing how direct and indirect relations can be extracted from academic and professional activities registered in a database of curriculum vitae in free-text format. We present evidence that this system can identify entities to assist in the process of knowledge extraction and representation to support ontology maintenance. We also demonstrate the extraction of relationships among ontology classes and their instances. We have demonstrated that our system can be used for the conversion of research information in free text format into database with a semantic structure. Future studies should test this system using the growing number of free-text information available at the institutional and national levels.

  19. Knowledge management: Role of the the Radiation Safety Information Computational Center (RSICC

    Directory of Open Access Journals (Sweden)

    Valentine Timothy

    2017-01-01

    Full Text Available The Radiation Safety Information Computational Center (RSICC at Oak Ridge National Laboratory (ORNL is an information analysis center that collects, archives, evaluates, synthesizes and distributes information, data and codes that are used in various nuclear technology applications. RSICC retains more than 2,000 software packages that have been provided by code developers from various federal and international agencies. RSICC’s customers (scientists, engineers, and students from around the world obtain access to such computing codes (source and/or executable versions and processed nuclear data files to promote on-going research, to ensure nuclear and radiological safety, and to advance nuclear technology. The role of such information analysis centers is critical for supporting and sustaining nuclear education and training programs both domestically and internationally, as the majority of RSICC’s customers are students attending U.S. universities. Additionally, RSICC operates a secure CLOUD computing system to provide access to sensitive export-controlled modeling and simulation (M&S tools that support both domestic and international activities. This presentation will provide a general review of RSICC’s activities, services, and systems that support knowledge management and education and training in the nuclear field.

  20. Shield Fields Within the Nemesis Tessera Quadrangle, Venus

    Science.gov (United States)

    Polit, A. T.; Koch, N. A.; Grosfils, E. B.; Reinen, L. A.

    2002-01-01

    Here we study small edifice concentrations in parts of Nemesis Tessera to quantify their spatial distribution and density. Does this affect shield field size, and do specific density values characterize different tectonic settings? Additional information is contained in the original extended abstract.

  1. A description of breast-feeding outcomes among U.S. mothers using nipple shields.

    Science.gov (United States)

    Hanna, Sheryl; Wilson, Marian; Norwood, Susan

    2013-06-01

    this study explored satisfaction with the use of ultrathin silicone nipple shields and breast-feeding experiences among mothers with early breast-feeding difficulties. a convenience sample of 81 postpartum mothers at a Baby Friendly community hospital in the northwest region of the U.S. participated in an exploratory, longitudinal descriptive study. A structured survey measured mothers' ratings of the helpfulness of the nipple shield, duration of nipple shield use and breast feeding, and infant weight gain patterns. the majority of mothers were satisfied with the nipple shield and 72% found it to be 'extremely helpful.' The median duration for nipple shield use was 6.6 weeks, with close to half of mothers stopping use of nipple shields by the fifth week postpartum. On average, study mothers breastfed for 12.6 weeks, and 31% of the mothers were still breast feeding at six months postpartum. study findings are consistent with prior research findings that nipple shields can help mothers who might otherwise abandon breast feeding. Problems with latch or painful, inverted or flat nipples may be managed in some cases with nipple shields. Health-care professionals should be aware of this option and offer mothers information on nipple shields when clinically indicated to alleviate breast-feeding difficulties. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. Magnetic shielding analysis of axisymmetric HTS plate by flux flow creep model

    Energy Technology Data Exchange (ETDEWEB)

    Kamitani, Atsushi; Ohshima, Shigetoshi [Department of Electrical and Information Engineering, Yamagata University, Yonezawa, Yamagata (Japan); Yokono, Takafumi

    1999-04-01

    The magnetic shielding performance of the high-Tc superconducting (HTS) plate is numerically investigated by assuming the flux flow creep model as a constitutive relation representing a mixed state. In order to reduce the number of variables, both the axisymmetry of the plate shape and the isotropy of the applied magnetic field are introduced. Under these assumptions, the shielding factor and the damping coefficient are calculated as functions of time and the frequency of the applied magnetic field. The results of computations show that an increase in the frequency will weaken the time dependence of the shielding factor and will enhance the shielding performance. In addition, the magnetic shielding performance in the low-frequency range and in the high-frequency range is shown to be strongly influenced by the flux creep and the flux flow, respectively. (author)

  3. Neutronic design of MYRRHA reactor hall shielding

    Science.gov (United States)

    Celik, Yurdunaz; Stankovskiy, Alexey; Eynde, Gert Van den

    2017-09-01

    The lateral shielding of a 600 MeV proton linear accelerator beam line in the MYRRHA reactor hall has been assessed using neutronic calculations by the MCNPX code complemented with analytical predictions. Continuous beam losses were considered to define the required shielding thickness that meets the requirements for the dose rate limits. Required shielding thicknesses were investigated from the viewpoint of accidental full beam loss as well as beam loss on collimator. The results confirm that the required shielding thicknesses are highly sensitive to the spatial shape of the beam and strongly divergent beam losses. Therefore shielding barrier should be designed according to the more conservative assumptions.

  4. Computer and online health information literacy among Belgrade citizens aged 66-89 years.

    Science.gov (United States)

    Gazibara, Tatjana; Kurtagic, Ilma; Kisic-Tepavcevic, Darija; Nurkovic, Selmina; Kovacevic, Nikolina; Gazibara, Teodora; Pekmezovic, Tatjana

    2016-06-01

    Computer users over 65 years of age in Serbia are rare. The purpose of this study was to (i) describe main demographic characteristics of computer users older than 65; (ii) evaluate their online health information literacy and (iii) assess factors associated with computer use in this population. Persons above 65 years of age were recruited at the Community Health Center 'Vračar' in Belgrade from November 2012 to January 2013. Data were collected after medical checkups using a questionnaire. Of 480 persons who were invited to participate 354 (73.7%) agreed to participate, while 346 filled in the questionnaire (72.1%). A total of 70 (20.2%) older persons were computer users (23.4% males vs. 17.7% females). Of those, 23.7% explored health-related web sites. The majority of older persons who do not use computers reported that they do not have a reason to use a computer (76.5%), while every third senior (30.4%) did not own a computer. Predictors of computer use were being younger [odds ratio (OR) = 2.14, 95% confidence interval (CI) 1.30-4.04; p = 0.019], having less members of household (OR = 2.97, 95% CI 1.45-6.08; p = 0.003), being more educated (OR = 3.53, 95% CI 1.88-6.63; p = 0.001), having higher income (OR = 2.31, 95% CI 1.17-4.58; p = 0.016) as well as fewer comorbidities (OR = 0.42, 95% CI 0.23-0.79; p = 0.007). Being male was independent predictor of online health information use at the level of marginal significance (OR = 4.43, 95% CI 1.93-21.00; p = 0.061). Frequency of computer and Internet use among older adults in Belgrade is similar to other populations. Patterns of Internet use as well as non-use demonstrate particular socio-cultural characteristics. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  5. A Survey on Data Storage and Information Discovery in the WSANs-Based Edge Computing Systems

    Directory of Open Access Journals (Sweden)

    Xingpo Ma

    2018-02-01

    Full Text Available In the post-Cloud era, the proliferation of Internet of Things (IoT has pushed the horizon of Edge computing, which is a new computing paradigm with data processed at the edge of the network. As the important systems of Edge computing, wireless sensor and actuator networks (WSANs play an important role in collecting and processing the sensing data from the surrounding environment as well as taking actions on the events happening in the environment. In WSANs, in-network data storage and information discovery schemes with high energy efficiency, high load balance and low latency are needed because of the limited resources of the sensor nodes and the real-time requirement of some specific applications, such as putting out a big fire in a forest. In this article, the existing schemes of WSANs on data storage and information discovery are surveyed with detailed analysis on their advancements and shortcomings, and possible solutions are proposed on how to achieve high efficiency, good load balance, and perfect real-time performances at the same time, hoping that it can provide a good reference for the future research of the WSANs-based Edge computing systems.

  6. Metaphor’s Role in the Information Behavior of Humans Interacting with Computers

    Directory of Open Access Journals (Sweden)

    Robin Sease

    2008-12-01

    Full Text Available Metaphors convey information, communicate abstractions, and help us understand new concepts. While the nascent field of information behavior (IB has adopted common metaphors like “berry-picking” and “gap-bridging” for its models, the study of how people use metaphors is only now emerging in the subfield of human information organizing behavior (HIOB. Metaphors have been adopted in human–computer interaction (HCI to facilitate the dialogue between user and system. Exploration of the literature on metaphors in the fields of linguistics and cognitive science as well as an examination of the history of use of metaphors in HCI as a case study of metaphor usage offers insight into the role of metaphor in human information behavior. Editor’s note: This article is the winner of the LITA/Ex Libris Writing Award, 2008.

  7. Using High Performance Computing to Examine the Processes of Neurogenesis Underlying Pattern Separation/Completion of Episodic Information.

    Energy Technology Data Exchange (ETDEWEB)

    Aimone, James Bradley [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Betty, Rita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-03-01

    Using High Performance Computing to Examine the Processes of Neurogenesis Underlying Pattern Separation/Completion of Episodic Information - Sandia researchers developed novel methods and metrics for studying the computational function of neurogenesis, thus generating substantial impact to the neuroscience and neural computing communities. This work could benefit applications in machine learning and other analysis activities.

  8. Barriers to use of information and computer technology by Australia's nurses: a national survey.

    Science.gov (United States)

    Eley, Robert; Fallon, Tony; Soar, Jeffrey; Buikstra, Elizabeth; Hegney, Desley

    2009-04-01

    To support policy planning for health, the barriers to the use of health information and computer technology (ICT) by nurses in Australia were determined. Australia, in line with many countries, aims to achieve a better quality of care and health outcomes through effective and innovative use of health information. Nurses form the largest component of the health workforce. Successful adoption of ICT by nurses will be a requirement for success. No national study has been undertaken to determine the barriers to adoption. A self-administered postal survey was conducted. A questionnaire was distributed to 10,000 members of the Australian Nursing Federation. Twenty possible barriers to the use of health ICT uptake were offered and responses were given on a five point Likert scale. Work demands, access to computers and lack of support were the principal barriers faced by nurses to their adoption of the technology in the workplace. Factors that were considered to present few barriers included age and lack of interest. While age was not considered by the respondents to be a barrier, their age was positively correlated with several barriers, including knowledge and confidence in the use of computers. Results indicate that to use the information and computer technologies being brought into health care fully, barriers that prevent the principal users from embracing those technologies must be addressed. Factors such as the age of the nurse and their level of job must be considered when developing strategies to overcome barriers. The findings of the present study provide essential information not only for national government and state health departments but also for local administrators and managers to enable clinical nurses to meet present and future job requirements.

  9. Thermal management of closed computer modules utilizing high density circuitry. [in Airborne Information Management System

    Science.gov (United States)

    Hoadley, A. W.; Porter, A. J.

    1990-01-01

    This paper presents data on a preliminary analysis of the thermal dynamic characteristics of the Airborne Information Management System (AIMS), which is a continuing design project at NASA Dryden. The analysis established the methods which will be applied to the actual AIMS boards as they become available. The paper also describes the AIMS liquid cooling system design and presents a thermodynamic computer model of the AIMS cooling system, together with an experimental validation of this model.

  10. Transmitting Information by Propagation in an Ocean Waveguide: Computation of Acoustic Field Capacity

    Science.gov (United States)

    2015-06-17

    OFDM systems in highly dispersive channels ,” J. Electr. Comput. Eng. 2012, 1–15 (2012). 14. T. Hayward and T. C. Yang, “Single and multi- channel ... Systems Branch Acoustics Division earl WilliamS Senior Scientist for Structural Acoustics Acoustics Division i REPORT DOCUMENTATION PAGE Form...of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering

  11. Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012

    CERN Document Server

    Kim, Jongsung; Zou, Deqing; Lee, Yang

    2012-01-01

    ITCS 2012 and STA 2012 address the various theories and practical applications of information technology convergence, secure and trust computing, and data management in future environments. It will present important results of significant value to solve the application services and various problems within the scope of ITCS 2012 & STA 2012. In addition, we expect it will trigger further related research and technology developments which will improve our lives in the future.

  12. Computer Simulation of Atoms Nuclei Structure Using Information Coefficients of Proportionality

    OpenAIRE

    Labushev, Mikhail M.

    2012-01-01

    The latest research of the proportionality of atomic weights of chemical elements made it possible to obtain 3 x 3 matrices for the calculation of information coefficients of proportionality Ip that can be used for 3D modeling of the structure of atom nucleus. The results of computer simulation show high potential of nucleus structure research for the characterization of their chemical and physical properties.

  13. Service-Learning in the Computer and Information Sciences Practical Applications in Engineering Education

    CERN Document Server

    Nejmeh, Brian A

    2012-01-01

    A road map for service-learning partnerships between information science and nonprofit organizations While service-learning is a well-known educational method for integrating learning experiences with community service, it is only now beginning to emerge in computer and information sciences (CIS). Offering a truly global perspective, this book introduces for the first time an essential framework for service learning in CIS, addressing both the challenges and opportunities of this approach for all stakeholders involved-faculty, students, and community nonprofit organizations (NPOs), both dome

  14. Bio-Inspired Computing, Information Swarms, and the Problem of Data Fusion

    Science.gov (United States)

    Nordmann, Brian

    The problem of information overload becomes a huge challenge, particularly when attempting to understanding how to introduce more and more disparate data streams into a data system. Little has been done on how to make those data streams understandable and usable by an analyst. A new paradigm is constructed here, unconstrained by the limits of the current desktop computer, to develop new ways of processing and analyzing data based on the behavior of cellular scale organisms. The additional issue of analytic "groupthink" or "information swarms" is also addressed, with potential solutions to the problem of "paralysis by analysis."

  15. Information Dissemination of Public Health Emergency on Social Networks and Intelligent Computation

    Science.gov (United States)

    Hu, Hongzhi; Mao, Huajuan; Hu, Xiaohua; Hu, Feng; Sun, Xuemin; Jing, Zaiping; Duan, Yunsuo

    2015-01-01

    Due to the extensive social influence, public health emergency has attracted great attention in today's society. The booming social network is becoming a main information dissemination platform of those events and caused high concerns in emergency management, among which a good prediction of information dissemination in social networks is necessary for estimating the event's social impacts and making a proper strategy. However, information dissemination is largely affected by complex interactive activities and group behaviors in social network; the existing methods and models are limited to achieve a satisfactory prediction result due to the open changeable social connections and uncertain information processing behaviors. ACP (artificial societies, computational experiments, and parallel execution) provides an effective way to simulate the real situation. In order to obtain better information dissemination prediction in social networks, this paper proposes an intelligent computation method under the framework of TDF (Theory-Data-Feedback) based on ACP simulation system which was successfully applied to the analysis of A (H1N1) Flu emergency. PMID:26609303

  16. Information Dissemination of Public Health Emergency on Social Networks and Intelligent Computation.

    Science.gov (United States)

    Hu, Hongzhi; Mao, Huajuan; Hu, Xiaohua; Hu, Feng; Sun, Xuemin; Jing, Zaiping; Duan, Yunsuo

    2015-01-01

    Due to the extensive social influence, public health emergency has attracted great attention in today's society. The booming social network is becoming a main information dissemination platform of those events and caused high concerns in emergency management, among which a good prediction of information dissemination in social networks is necessary for estimating the event's social impacts and making a proper strategy. However, information dissemination is largely affected by complex interactive activities and group behaviors in social network; the existing methods and models are limited to achieve a satisfactory prediction result due to the open changeable social connections and uncertain information processing behaviors. ACP (artificial societies, computational experiments, and parallel execution) provides an effective way to simulate the real situation. In order to obtain better information dissemination prediction in social networks, this paper proposes an intelligent computation method under the framework of TDF (Theory-Data-Feedback) based on ACP simulation system which was successfully applied to the analysis of A (H1N1) Flu emergency.

  17. Psychopathy-related traits and the use of reward and social information: a computational approach

    Science.gov (United States)

    Brazil, Inti A.; Hunt, Laurence T.; Bulten, Berend H.; Kessels, Roy P. C.; de Bruijn, Ellen R. A.; Mars, Rogier B.

    2013-01-01

    Psychopathy is often linked to disturbed reinforcement-guided adaptation of behavior in both clinical and non-clinical populations. Recent work suggests that these disturbances might be due to a deficit in actively using information to guide changes in behavior. However, how much information is actually used to guide behavior is difficult to observe directly. Therefore, we used a computational model to estimate the use of information during learning. Thirty-six female subjects were recruited based on their total scores on the Psychopathic Personality Inventory (PPI), a self-report psychopathy list, and performed a task involving simultaneous learning of reward-based and social information. A Bayesian reinforcement-learning model was used to parameterize the use of each source of information during learning. Subsequently, we used the subscales of the PPI to assess psychopathy-related traits, and the traits that were strongly related to the model's parameters were isolated through a formal variable selection procedure. Finally, we assessed how these covaried with model parameters. We succeeded in isolating key personality traits believed to be relevant for psychopathy that can be related to model-based descriptions of subject behavior. Use of reward-history information was negatively related to levels of trait anxiety and fearlessness, whereas use of social advice decreased as the perceived ability to manipulate others and lack of anxiety increased. These results corroborate previous findings suggesting that sub-optimal use of different types of information might be implicated in psychopathy. They also further highlight the importance of considering the potential of computational modeling to understand the role of latent variables, such as the weight people give to various sources of information during goal-directed behavior, when conducting research on psychopathy-related traits and in the field of forensic psychiatry. PMID:24391615

  18. Public library computer training for older adults to access high-quality Internet health information.

    Science.gov (United States)

    Xie, Bo; Bugg, Julie M

    2009-09-01

    An innovative experiment to develop and evaluate a public library computer training program to teach older adults to access and use high-quality Internet health information involved a productive collaboration among public libraries, the National Institute on Aging and the National Library of Medicine of the National Institutes of Health (NIH), and a Library and Information Science (LIS) academic program at a state university. One hundred and thirty-one older adults aged 54-89 participated in the study between September 2007 and July 2008. Key findings include: a) participants had overwhelmingly positive perceptions of the training program; b) after learning about two NIH websites (http://nihseniorhealth.gov and http://medlineplus.gov) from the training, many participants started using these online resources to find high quality health and medical information and, further, to guide their decision-making regarding a health- or medically-related matter; and c) computer anxiety significantly decreased (p improvements in computer attitudes between pre- and post-training. The findings have implications for public libraries, LIS academic programs, and other organizations interested in providing similar programs in their communities.

  19. ATLAS Award for Shield Supplier

    CERN Multimedia

    2004-01-01

    ATLAS technical coordinator Dr. Marzio Nessi presents the ATLAS supplier award to Vojtech Novotny, Director General of Skoda Hute.On 3 November, the ATLAS experiment honoured one of its suppliers, Skoda Hute s.r.o., of Plzen, Czech Republic, for their work on the detector's forward shielding elements. These huge and very massive cylinders surround the beampipe at either end of the detector to block stray particles from interfering with the ATLAS's muon chambers. For the shields, Skoda Hute produced 10 cast iron pieces with a total weight of 780 tonnes at a cost of 1.4 million CHF. Although there are many iron foundries in the CERN member states, there are only a limited number that can produce castings of the necessary size: the large pieces range in weight from 59 to 89 tonnes and are up to 1.5 metres thick.The forward shielding was designed by the ATLAS Technical Coordination in close collaboration with the ATLAS groups from the Czech Technical University and Charles University in Prague. The Czech groups a...

  20. Shielding proposal to reduce cross-talk from ITER lower port to equatorial port

    Energy Technology Data Exchange (ETDEWEB)

    Juarez, Rafael, E-mail: rjuarez@ind.uned.es [Departamento de Ingeniería Energética, ETSII-UNED, Calle Juan del Rosal 12, Madrid 28040 (Spain); Pampin, Raul [F4E, Torres Diagonal Litoral B3, Josep Pla 2, Barcelona 08019 (Spain); Levesy, Bruno [ITER Organization, 13115 Route de Vinon sur Verdon, St Paul Lez Durance (France); Moro, Fabio [ENEA, Via Enrico Fermi 45, Frascati, Rome (Italy); Suarez, Alejandro [ITER Organization, 13115 Route de Vinon sur Verdon, St Paul Lez Durance (France); Catalan, J.P.; Sanz, Javier [Departamento de Ingeniería Energética, ETSII-UNED, Calle Juan del Rosal 12, Madrid 28040 (Spain)

    2015-12-15

    Radiation cross-talk from Torus Cryopump LP to EP was found to be a phenomenon driving Shutdown Dose Rates at EP Port Interspace after 12 days of cooling time, as relevant as neutron permeation through EP itself. In this work three different shields are proposed to mitigate the radiation cross-talk: two neutron shields placed inside LP, and a temporary gamma shield placed at EP PI during maintenance activities. Contributions from different reactor regions to Shutdown Dose Rates are computed, for the unshielded design, as long as the different shielded cases. The Rigorous-Two-Steps (R2S) method was used. The neutron shields inside TCP-LP are found to reduce SDR at EP PI 43 μSv/h and 99 μSv/h, while the gamma shield inside EP PI offers a reduction of 157 μSv/h in its heaviest configuration. Among these relevant reductions, the gamma shield inside the EP PI offers the best shielding option, as it reduces gamma cross-talk from TCP-LP and also protects EP PI from Port Duct and EP bellows activation, while it does not interfere with TCP performance.

  1. Quantum Information, computation and cryptography. An introductory survey of theory, technology and experiments

    Energy Technology Data Exchange (ETDEWEB)

    Benatti, Fabio [Trieste Univ., Miramare (Italy). Dipt. Fisica Teorica; Fannes, Mark [Leuven Univ. (Belgium). Inst. voor Theoretische Fysica; Floreanini, Roberto [INFN, Trieste (Italy). Dipt. di Fisica Teorica; Petritis, Dimitri (eds.) [Rennes 1 Univ., 35 (France). Inst. de Recherche Mathematique de Rennes

    2010-07-01

    This multi-authored textbook addresses graduate students with a background in physics, mathematics or computer science. No research experience is necessary. Consequently, rather than comprehensively reviewing the vast body of knowledge and literature gathered in the past twenty years, this book concentrates on a number of carefully selected aspects of quantum information theory and technology. Given the highly interdisciplinary nature of the subject, the multi-authored approach brings together different points of view from various renowned experts, providing a coherent picture of the subject matter. The book consists of ten chapters and includes examples, problems, and exercises. The first five present the mathematical tools required for a full comprehension of various aspects of quantum mechanics, classical information, and coding theory. Chapter 6 deals with the manipulation and transmission of information in the quantum realm. Chapters 7 and 8 discuss experimental implementations of quantum information ideas using photons and atoms. Finally, chapters 9 and 10 address ground-breaking applications in cryptography and computation. (orig.)

  2. Radiation shielding properties of a novel cement–basalt mixture for nuclear energy applications

    Energy Technology Data Exchange (ETDEWEB)

    Ipbüker, Cagatay; Nulk, Helena; Gulik, Volodymyr [University of Tartu, Institute of Physics (Estonia); Biland, Alex [HHK Technologies, Houston (United States); Tkaczyk, Alan Henry, E-mail: alan@ut.ee [University of Tartu, Institute of Physics (Estonia)

    2015-04-01

    Highlights: • Basalt fiber is a relatively cheap material that can be used as reinforcement. • Gamma-ray attenuation remains relatively stable with addition of basalt fiber. • Neutron attenuation remains relatively stable with addition of basalt fiber. • Cement–basalt mixture has a good potential for use in nuclear energy applications. - Abstract: The radiation shielding properties of a new proposed building material, a novel cement–basalt fiber mixture (CBM), are investigated. The authors analyze the possibility of this material to be a viable substitute to outgoing materials in nuclear energy applications, which will lead to a further sustained development of nuclear energy in the future. This computational study involves four types of concrete with various amounts of basalt fiber in them. The gamma-ray shielding characteristics of proposed CBM material are investigated with the help of WinXCom program, whereas the neutron shielding characteristics are computed by the Serpent code. For gamma-ray shielding, we find that the attenuation coefficients of concretes with basalt fibers are not notably influenced by the addition of fibers. For neutron shielding, additional basalt fiber in mixture presents negligible effect on neutron radiation shielding. With respect to radiation shielding, it can be concluded that basalt fibers have good potential as an addition to heavyweight concrete for nuclear energy applications.

  3. High performance computing and communications: Advancing the frontiers of information technology

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-12-31

    This report, which supplements the President`s Fiscal Year 1997 Budget, describes the interagency High Performance Computing and Communications (HPCC) Program. The HPCC Program will celebrate its fifth anniversary in October 1996 with an impressive array of accomplishments to its credit. Over its five-year history, the HPCC Program has focused on developing high performance computing and communications technologies that can be applied to computation-intensive applications. Major highlights for FY 1996: (1) High performance computing systems enable practical solutions to complex problems with accuracies not possible five years ago; (2) HPCC-funded research in very large scale networking techniques has been instrumental in the evolution of the Internet, which continues exponential growth in size, speed, and availability of information; (3) The combination of hardware capability measured in gigaflop/s, networking technology measured in gigabit/s, and new computational science techniques for modeling phenomena has demonstrated that very large scale accurate scientific calculations can be executed across heterogeneous parallel processing systems located thousands of miles apart; (4) Federal investments in HPCC software R and D support researchers who pioneered the development of parallel languages and compilers, high performance mathematical, engineering, and scientific libraries, and software tools--technologies that allow scientists to use powerful parallel systems to focus on Federal agency mission applications; and (5) HPCC support for virtual environments has enabled the development of immersive technologies, where researchers can explore and manipulate multi-dimensional scientific and engineering problems. Educational programs fostered by the HPCC Program have brought into classrooms new science and engineering curricula designed to teach computational science. This document contains a small sample of the significant HPCC Program accomplishments in FY 1996.

  4. Bridging the digital divide through the integration of computer and information technology in science education: An action research study

    Science.gov (United States)

    Brown, Gail Laverne

    The presence of a digital divide, computer and information technology integration effectiveness, and barriers to continued usage of computer and information technology were investigated. Thirty-four African American and Caucasian American students (17 males and 17 females) in grades 9--11 from 2 Georgia high school science classes were exposed to 30 hours of hands-on computer and information technology skills. The purpose of the exposure was to improve students' computer and information technology skills. Pre-study and post-study skills surveys, and structured interviews were used to compare race, gender, income, grade-level, and age differences with respect to computer usage. A paired t-test and McNemar test determined mean differences between student pre-study and post-study perceived skills levels. The results were consistent with findings of the National Telecommunications and Information Administration (2000) that indicated the presence of a digital divide and digital inclusion. Caucasian American participants were found to have more at-home computer and Internet access than African American participants, indicating that there is a digital divide by ethnicity. Caucasian American females were found to have more computer and Internet access which was an indication of digital inclusion. Sophomores had more at-home computer access and Internet access than other levels indicating digital inclusion. Students receiving regular meals had more computer and Internet access than students receiving free/reduced meals. Older students had more computer and Internet access than younger students. African American males had been using computer and information technology the longest which is an indication of inclusion. The paired t-test and McNemar test revealed significant perceived student increases in all skills levels. Interviews did not reveal any barriers to continued usage of the computer and information technology skills.

  5. Influence of Perceived Information Overload on Learning in Computer-Mediated Communication

    Science.gov (United States)

    Chen, Chun-Ying

    Information overload (IO) is frequently reported as one of the main problems caused by computer-mediated communication (CMC), yet the literature is unclear about the impact of IO on student learning. This study therefore aimed to investigate the influence of online students’ perceived IO on quality learning in CMC. Quality learning was defined as learning that is achievable by (a) reflective thinking through a deep level of information processing, and by (b) active learning through interaction with other people. The results suggest that students’ perceived IO does not influence their deep processing as observed in their discussion messages, but might influence their participation and interaction with others in online discussions. Students’ amount of invested mental effort put into study was observed as a major determinant of levels of information processing in this study.

  6. Turning text into research networks: information retrieval and computational ontologies in the creation of scientific databases.

    Directory of Open Access Journals (Sweden)

    Flávio Ceci

    Full Text Available BACKGROUND: Web-based, free-text documents on science and technology have been increasing growing on the web. However, most of these documents are not immediately processable by computers slowing down the acquisition of useful information. Computational ontologies might represent a possible solution by enabling semantically machine readable data sets. But, the process of ontology creation, instantiation and maintenance is still based on manual methodologies and thus time and cost intensive. METHOD: We focused on a large corpus containing information on researchers, research fields, and institutions. We based our strategy on traditional entity recognition, social computing and correlation. We devised a semi automatic approach for the recognition, correlation and extraction of named entities and relations from textual documents which are then used to create, instantiate, and maintain an ontology. RESULTS: We present a prototype demonstrating the applicability of the proposed strategy, along with a case study describing how direct and indirect relations can be extracted from academic and professional activities registered in a database of curriculum vitae in free-text format. We present evidence that this system can identify entities to assist in the process of knowledge extraction and representation to support ontology maintenance. We also demonstrate the extraction of relationships among ontology classes and their instances. CONCLUSION: We have demonstrated that our system can be used for the conversion of research information in free text format into database with a semantic structure. Future studies should test this system using the growing number of free-text information available at the institutional and national levels.

  7. Radiation shielding properties of high performance concrete reinforced with basalt fibers infused with natural and enriched boron

    Energy Technology Data Exchange (ETDEWEB)

    Zorla, Eyüp; Ipbüker, Cagatay [University of Tartu, Institute of Physics (Estonia); Biland, Alex [US Basalt Corp., Houston (United States); Kiisk, Madis [University of Tartu, Institute of Physics (Estonia); Kovaljov, Sergei [OÜ Basaltest, Tartu (Estonia); Tkaczyk, Alan H. [University of Tartu, Institute of Physics (Estonia); Gulik, Volodymyr, E-mail: volodymyr.gulik@gmail.com [Institute for Safety Problems of Nuclear Power Plants, Lysogirska 12, of. 201, 03028 Kyiv (Ukraine)

    2017-03-15

    Highlights: • Basalt fiber infused with natural and enriched boron in varying proportions. • Gamma-ray attenuation remains stable with addition of basalt-boron fiber. • Improvement in neutron shielding for nuclear facilities producing fast fission spectrum. • Basalt-boron fiber could decrease the shielding thickness in thermal spectrum reactors. - Abstract: The importance of radiation shielding is increasing in parallel with the expansion of the application areas of nuclear technologies. This study investigates the radiation shielding properties of two types of high strength concrete reinforced with basalt fibers infused with 12–20% boron oxide, containing varying fractions of natural and enriched boron. The gamma-ray shielding characteristics are analyzed with the help of the WinXCom, whereas the neutron shielding characteristics are modeled and computed by Monte Carlo Serpent code. For gamma-ray shielding, the attenuation coefficients of the studied samples do not display any significant variation due to the addition of basalt-boron fibers at any mixing proportion. For neutron shielding, the addition of basalt-boron fiber has negligible effects in the case of very fast neutrons (14 MeV), but it could considerably improve the neutron shielding of concrete for nuclear facilities producing a fast fission spectrum (e.g. with reactors as BN-800, FBTR) and thermal neutron spectrum (Light Water Reactors (LWR)). It was also found that basalt-boron fiber could decrease the thickness of radiation shielding material in thermal spectrum reactors.

  8. Nanoinformatics: an emerging area of information technology at the intersection of bioinformatics, computational chemistry and nanobiotechnology.

    Science.gov (United States)

    González-Nilo, Fernando; Pérez-Acle, Tomás; Guínez-Molinos, Sergio; Geraldo, Daniela A; Sandoval, Claudia; Yévenes, Alejandro; Santos, Leonardo S; Laurie, V Felipe; Mendoza, Hegaly; Cachau, Raúl E

    2011-01-01

    After the progress made during the genomics era, bioinformatics was tasked with supporting the flow of information generated by nanobiotechnology efforts. This challenge requires adapting classical bioinformatic and computational chemistry tools to store, standardize, analyze, and visualize nanobiotechnological information. Thus, old and new bioinformatic and computational chemistry tools have been merged into a new sub-discipline: nanoinformatics. This review takes a second look at the development of this new and exciting area as seen from the perspective of the evolution of nanobiotechnology applied to the life sciences. The knowledge obtained at the nano-scale level implies answers to new questions and the development of new concepts in different fields. The rapid convergence of technologies around nanobiotechnologies has spun off collaborative networks and web platforms created for sharing and discussing the knowledge generated in nanobiotechnology. The implementation of new database schemes suitable for storage, processing and integrating physical, chemical, and biological properties of nanoparticles will be a key element in achieving the promises in this convergent field. In this work, we will review some applications of nanobiotechnology to life sciences in generating new requirements for diverse scientific fields, such as bioinformatics and computational chemistry.

  9. Self-perceived intrinsic and extrinsic differences between Information Systems and Computer Science university students

    Directory of Open Access Journals (Sweden)

    Patricia M Alexander

    2014-06-01

    Full Text Available Strong arguments exist that the sub-disciplines of Information Systems (IS and Computer Science (CS can be meaningfully distinguished, and the literature indicates that teams in which there are variety of personalities and divergent career interests are more likely to successfully complete computing projects. This paper set out to identify differences in terms of personality and career objectives between those entering universities with the intention of pursuing a career in CS and those intending to study IS. First-year students from South African tertiary institutions in 2010 and 2012 were studied in terms of self-reported personality factors (using the Five Factor Model as frame of analysis as well as perceived environmental factors associated with career choice. Surprisingly, the only persistent significant difference found was that IS students consider well-paid employment as soon as possible after graduating to be more important than CS students do. In terms of the other factors studied no significant differences were found to occur in both years for which data was analysed. Hence, the result show that combining data collected from the students studying different sub-disciplines of computing is justified for research that specifically studies personality or factors such as interest, self-efficacy, career outcomes and how the career choice impacts on quality of life. At a practical level, the findings inform efforts in attracting, retaining and teaching students in these sub-disciplines.

  10. Shielding of a neutron irradiator with {sup 241}Am-Be source

    Energy Technology Data Exchange (ETDEWEB)

    Oliveira, K.A.M. de; Crispim, V.R.; Silva, A.X., E-mail: koliveira@con.ufrj.b, E-mail: verginia@con.ufrj.b, E-mail: ademir@con.ufrj.b [Universidade Federal do Rio de Janeiro (PEN/COPPE/UFRJ), RJ (Brazil). Coordenacao dos Programas de Pos-Graduacao de Engenharia. Programa de Engenharia Nuclear; Fonseca, E.S., E-mail: evaldo@ird.gov.b [Instituto de Radioprotecao e Dosimetria (IRD/CNEN-RJ), Rio de Janeiro, RJ (Brazil)

    2011-07-01

    The equivalent dose rates at 1.0 cm from the outer surface of the shielding of a neutron irradiation system that uses {sup 241}Am-Be source with activity of 185 GBq (5 Ci) were determined. A theoretical-experimental approach including case studies, through computer simulations with MCNP code was employed to calculate the best shielding thickness. Following the construction of the neutron irradiator, dose measurements were conducted in order to validate data obtained from simulation. The neutron irradiator shielding was designed in such a way to allow transport of the neutron radiography system for in loco inspections ensuring workers' radiologic safety. (author)

  11. SHIELD-HIT12A - a Monte Carlo particle transport program for ion therapy research

    DEFF Research Database (Denmark)

    Bassler, Niels; Hansen, David Christoffer; Lühr, Armin

    2014-01-01

    . We experienced that new users quickly learn to use SHIELD-HIT12A and setup new geometries. Contrary to previous versions of SHIELD-HIT, the 12A distribution comes along with easy-to-use example files and an English manual. A new implementation of Vavilov straggling resulted in a massive reduction...... of computation time. Scheduled for later release are CT import and photon-electron transport. Conclusions: SHIELD-HIT12A is an interesting alternative ion transport engine. Apart from being a flexible particle therapy research tool, it can also serve as a back end for a MC ion treatment planning system. More...

  12. A computer-based education intervention to enhance surrogates' informed consent for genomics research.

    Science.gov (United States)

    Shelton, Ann K; Freeman, Bradley D; Fish, Anne F; Bachman, Jean A; Richardson, Lloyd I

    2015-03-01

    Many research studies conducted today in critical care have a genomics component. Patients' surrogates asked to authorize participation in genomics research for a loved one in the intensive care unit may not be prepared to make informed decisions about a patient's participation in the research. To examine the effectiveness of a new, computer-based education module on surrogates' understanding of the process of informed consent for genomics research. A pilot study was conducted with visitors in the waiting rooms of 2 intensive care units in a Midwestern tertiary care medical center. Visitors were randomly assigned to the experimental (education module plus a sample genomics consent form; n = 65) or the control (sample genomics consent form only; n = 69) group. Participants later completed a test on informed genomics consent. Understanding the process of informed consent was greater (P = .001) in the experimental group than in the control group. Specifically, compared with the control group, the experimental group had a greater understanding of 8 of 13 elements of informed consent: intended benefits of research (P = .02), definition of surrogate consenter (P= .001), withdrawal from the study (P = .001), explanation of risk (P = .002), purpose of the institutional review board (P = .001), definition of substituted judgment (P = .03), compensation for harm (P = .001), and alternative treatments (P = .004). Computer-based education modules may be an important addition to conventional approaches for obtaining informed consent in the intensive care unit. Preparing patients' family members who may consider serving as surrogate consenters is critical to facilitating genomics research in critical care. ©2015 American Association of Critical-Care Nurses.

  13. Trends in Information Security for Mexican Companies, is the Cloud Computing the Answer?

    Directory of Open Access Journals (Sweden)

    Sandra-Dinora Orantes-Jiménez

    2014-04-01

    Full Text Available With advances in Information Technology and Communications infrastructure, different forms and modern programming models in use have called for innovative forms of Internet and Cloud Computing has come a long way since it was first tagged as a future perspective by some researchers. Cloud Computing, where computing resources and services are offered and consumed over Internet without the users having knowledge of the infrastructure. This idea assumes creating an Internet in which programs and data are stored at all times and is available for people who wish to access to them. The truth is that it is not a completely unknown structure for those who often use services on the Net. Cloud Computing is convenient for users and is profitable for suppliers because, despite having some risks, working with this new type of technology, allows a saving on both licenses and administration of services and equipment needed. Therefore, they may represent an importance for businesses, particularly in Mexico. However, suppliers trying to counter the insecurity that currently is presented by the Cloud, have to abide by rules if they want to offer their services.

  14. Data Security Risk Estimation for Information-Telecommunication Systems on the basis of Cloud Computing

    Directory of Open Access Journals (Sweden)

    Anatoly Valeryevich Tsaregorodtsev

    2014-02-01

    Full Text Available Cloud computing will be one of the most common IT technologies to deploy applications, due to its key features: on-demand network access to a shared pool of configurable computing resources, flexibility and good quality/price ratio. Migrating to cloud architecture enables organizations to reduce the overall cost of implementing and maintaining the infrastructure and reduce development time for new business applications. There are many factors that influence the information security environment of cloud, as its multitenant architecture brings new and more complex problems and vulnerabilities. And the approach to risk estimation used in making decisions about the migration of critical data in the cloud infrastructure of the organization are proposed in the paper.

  15. Progress in Research on Lightweight Graphene-based EMI Shielding Materials

    Directory of Open Access Journals (Sweden)

    WANG Chan-yuan

    2016-10-01

    Full Text Available With rapid progresses on the advanced electronic science and technology, electromagnetic irradiations have led to considerable issues, including electromagnetic pollutions, electromagnetic interference and security concerns, in electronics, aeronautics, astronautics, information technology, communication systems and etc. Based on the fundamentals of the electromagnetic interference shielding and general methods for preparing graphene nanosheets, this review involves the recent advances in the electromagnetic interference shielding materials of various applications in four morphologies, which include bulk, lightweight foams, flexible films and those for operation at high temperature. Meanwhile, the major strategical methods and general concept for designing and fabricating graphene-based electromagnetic interference shielding materials have been overviewed, and fundamental issues of electromagnetic interference technology have been further discussed. The perspectives for fabricating novel electromagnetic interference shielding materials, including ultrathin and transparent configuration, and future development have been proposed based on the practical applications, which suggest significant conception for designing next generation lightweight EMI shielding materials.

  16. DOE Advanced Scientific Computing Advisory Committee (ASCAC) Subcommittee Report on Scientific and Technical Information

    Energy Technology Data Exchange (ETDEWEB)

    Hey, Tony [eScience Institute, University of Washington; Agarwal, Deborah [Lawrence Berkeley National Laboratory; Borgman, Christine [University of California, Los Angeles; Cartaro, Concetta [SLAC National Accelerator Laboratory; Crivelli, Silvia [Lawrence Berkeley National Laboratory; Van Dam, Kerstin Kleese [Pacific Northwest National Laboratory; Luce, Richard [University of Oklahoma; Arjun, Shankar [CADES, Oak Ridge National Laboratory; Trefethen, Anne [University of Oxford; Wade, Alex [Microsoft Research, Microsoft Corporation; Williams, Dean [Lawrence Livermore National Laboratory

    2015-09-04

    The Advanced Scientific Computing Advisory Committee (ASCAC) was charged to form a standing subcommittee to review the Department of Energy’s Office of Scientific and Technical Information (OSTI) and to begin by assessing the quality and effectiveness of OSTI’s recent and current products and services and to comment on its mission and future directions in the rapidly changing environment for scientific publication and data. The Committee met with OSTI staff and reviewed available products, services and other materials. This report summaries their initial findings and recommendations.

  17. e-Government Ethics : a Synergy of Computer Ethics, Information Ethics, and Cyber Ethics

    OpenAIRE

    Arief Ramadhan; Dana Indra Sensuse; Aniati Murni Arymurthy

    2011-01-01

    Ethics has become an important part in the interaction among humans being. This paper specifically discusses applied ethics as one type of ethics. There are three applied ethics that will be reviewed in this paper, i.e. computer ethics, information ethics, and cyber ethics. There are two aspects of the three applied ethics that were reviewed, i.e. their definition and the issues associated with them. The reviewing results of the three applied ethics are then used for defining e-Government eth...

  18. 3rd International Conference on Modelling, Computation and Optimization in Information Systems and Management Sciences

    CERN Document Server

    Dinh, Tao; Nguyen, Ngoc

    2015-01-01

    This proceedings set contains 85 selected full papers presented at the 3rd International Conference on Modelling, Computation and Optimization in Information Systems and Management Sciences - MCO 2015, held on May 11–13, 2015 at Lorraine University, France. The present part I of the 2 volume set includes articles devoted to Combinatorial optimization and applications, DC programming and DCA: thirty years of Developments, Dynamic Optimization, Modelling and Optimization in financial engineering, Multiobjective programming, Numerical Optimization, Spline Approximation and Optimization, as well as Variational Principles and Applications

  19. A Pilot Project – From Illiteracy to Computer Literacy: Teaching and Learning Using Information Technology

    Directory of Open Access Journals (Sweden)

    Mohamad Adnan Al-Alaoui

    2008-09-01

    Full Text Available This paper addresses the use of information and communication technologies, ICT or IT for brevity, to combat illiteracy and move participants directly from illiteracy to computer literacy. The resulting assistive technology and instructional software and hardware can be employed to speed up literacy programs and make them more attractive and effective. The approach provides an interactive, self-paced, autonomous and entertaining learning experience, eases entry and exit in and out of the program, and permits monitoring and updating progress status. The hallmark of the proposed approach is the integration of speech and handwriting recognition, as well as audio and visual aids into the flow.

  20. Enhancing computer literacy and information retrieval skills: A rural and remote nursing and midwifery workforce study.

    Science.gov (United States)

    Mills, Jane; Francis, Karen; McLeod, Margaret; Al-Motlaq, Mohammad

    2015-01-01

    Nurses and midwives collectively, represent the largest workforce category in rural and remote areas of Australia. Maintaining currency of practice and attaining annual licensure with the Australian Health Practitioners Regulatory Authority (AHPRA) present challenges for individual nurses and midwives and for their health service managers. Engagement with information and communication technologies, in order for geographically isolated clinicians to access ongoing education and training, is considered a useful strategy to address such challenges. This paper presents a pre- and post-test study design. It examines the impact of an online continuing professional development (CPD) program on Australian rural nurses and midwives. The aims of the program were to increase basic skill acquisition in the utilisation of common computer software, the use of the Internet and the enhancement of email communication. Findings from the study demonstrate that participants who complete a relevant CPD program gain confidence in the use of information and communication technologies. Further, increased confidence leads to increased access to contemporary, reliable and important health care information on the Internet, in addition to clinicians adopting email as a regular method of communication. Health care employers commonly assume employees are skilled users of information and communication technologies. However, findings from this study contradict such assumptions. It is argued in the recommendations that health care employees should be given regular access to CPD programs designed to introduce them to information and communication technologies. Developing knowledge and skills in this area has the potential to improve staff productivity, raise health care standards and improve patient outcomes.

  1. NEUTRONIC REACTOR SHIELD AND SPACER CONSTRUCTION

    Science.gov (United States)

    Wigner, E.P.; Ohlinger, L.A.

    1958-11-18

    Reactors of the heterogeneous, graphite moderated, fluid cooled type and shielding and spacing plugs for the coolant channels thereof are reported. In this design, the coolant passages extend horizontally through the moderator structure, accommodating the fuel elements in abutting end-to-end relationship, and have access openings through the outer shield at one face of the reactor to facilitate loading of the fuel elements. In the outer ends of the channels which extend through the shields are provided spacers and shielding plugs designed to offer minimal reslstance to coolant fluid flow while preventing emanation of harmful radiation through the access openings when closed between loadings.

  2. The Modeling and Complexity of Dynamical Systems by Means of Computation and Information Theories

    Directory of Open Access Journals (Sweden)

    Robert Logozar

    2011-12-01

    Full Text Available We present the modeling of dynamical systems and finding of their complexity indicators by the use of concepts from computation and information theories, within the framework of J. P. Crutchfield's theory of  ε-machines. A short formal outline of the  ε-machines is given. In this approach, dynamical systems are analyzed directly from the time series that is received from a properly adjusted measuring instrument. The binary strings are parsed through the parse tree, within which morphologically and probabilistically unique subtrees or morphs are recognized as system states. The outline and precise interrelation of the information-theoretic entropies and complexities emanating from the model is given. The paper serves also as a theoretical foundation for the future presentation of the DSA program that implements the  ε-machines modeling up to the stochastic finite automata level.

  3. Classified computer configuration control system (C{sup 4}S), revision 3, user`s information

    Energy Technology Data Exchange (ETDEWEB)

    O`Callaghan, P.B.; Nelson, R.A. [Westinghouse Hanford Company, Richland, WA (United States); Grambihler, A.J. [Boeing Computer Services Richland, Inc., Richland, WA (United States)

    1994-04-01

    The Classified Computer Configuration Control System (C{sup 4}S) allows security management to track pertinent information concerning classified computer systems in the scope of their control. Information is entered by the level security manager that is closest to the classified computer system. Managers that are further removed from systems can have consolidated information made available to them. C{sup 4}S can be used to generate reports that are as current as the last information that was entered into the database. C{sup 4}S offers data entry, data display, and data reporting. The user interface uses menus, entry forms, the mouse, and Hot Keys. C{sup 4}S provides help windows that are available at any time by pressing the F1 key. C{sup 4}S has help for each menu, data entry form, and general program information. You can browse a help window by pressing the arrows, page up, or page down keys. You control C{sup 4}S with program options selected from pull-down menus. You {open_quotes}select{close_quotes} by moving a highlight bar up and down or across the menu and pressing enter on one of the options. The highlight bar is moved using the arrow keys, mouse, or selection letters. Notice that a letter of each menu option is a different color from the other letters. This is the selection letter for that option. If you press the selection letter, the highlight bar will move to that option. You can also use a mouse to move the highlight bar to the option by moving the mouse pointer to the option and pressing the mouse button. Explanation of menu options or entry fields appear at the bottom of the screen. These explanations should help you use C{sup 4}S. If you need more help, it is available by pressing F1. C{sup 4}S will bring up a help window for the particular option you are working with. The authors of the program are P.B. O`Callaghan, A. J. Grambihler, and R.A. Nelson.

  4. Continuous electrodeionization through electrostatic shielding

    Energy Technology Data Exchange (ETDEWEB)

    Dermentzis, Konstantinos [Technological Educational Institute, T.E.I. of Kavala, General Department of Sciences, Laboratory of Chemical Technology, Agios Loucas, 65404 Kavala (Greece)], E-mail: demerz@otenet.gr

    2008-02-15

    We report a new continuous electrodeionization cell with electrostatically shielded concentrate compartments or electrochemical Faraday cages formed by porous electronically and ionically conductive media, instead of permselective ion exchange membranes. Due to local elimination of the applied electric field within the compartments, they electrostatically retain the incoming ions and act as 'electrostatic ion pumps' or 'ion traps' and therefore concentrate compartments. The porous media are chemically and thermally stable. Electrodeionization or electrodialysis cells containing such concentrate compartments in place of ion exchange membranes can be used to regenerate ion exchange resins and produce deionized water, to purify industrial effluents and desalinate brackish or seawater. The cells can work by polarity reversal without any negative impact to the deionization process. Because the electronically and ionically active media constituting the electrostatically shielded concentrate compartments are not permselective and coions are not repelled but can be swept by the migrating counterions, the cells are not affected by the known membrane associated limitations, such as concentration polarization or scaling and show an increased current efficiency.

  5. Assessment of patient dose reduction by bismuth shielding in CT using measurements, GEANT4 and MCNPX simulations.

    Science.gov (United States)

    Mendes, M; Costa, F; Figueira, C; Madeira, P; Teles, P; Vaz, P

    2015-07-01

    This work reports on the use of two different Monte Carlo codes (GEANT4 and MCNPX) for assessing the dose reduction using bismuth shields in computer tomography (CT) procedures in order to protect radiosensitive organs such as eye lens, thyroid and breast. Measurements were performed using head and body PMMA phantoms and an ionisation chamber placed in five different positions of the phantom. Simulations were performed to estimate Computed Tomography Dose Index values using GEANT4 and MCNPX. The relative differences between measurements and simulations were bismuth shielding ranges from 2 to 45 %, depending on the position of the bismuth shield. The percentage of dose reduction was more significant for the area covered by the bismuth shielding (36 % for eye lens, 39 % for thyroid and 45 % for breast shields). © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  6. Using Wireless Handheld Computers to Seek Information at the Point of Care: An Evaluation by Clinicians

    Science.gov (United States)

    Hauser, Susan E.; Demner-Fushman, Dina; Jacobs, Joshua L.; Humphrey, Susanne M.; Ford, Glenn; Thoma, George R.

    2007-01-01

    Objective To evaluate: (1) the effectiveness of wireless handheld computers for online information retrieval in clinical settings; (2) the role of MEDLINE® in answering clinical questions raised at the point of care. Design A prospective single-cohort study: accompanying medical teams on teaching rounds, five internal medicine residents used and evaluated MD on Tap, an application for handheld computers, to seek answers in real time to clinical questions arising at the point of care. Measurements All transactions were stored by an intermediate server. Evaluators recorded clinical scenarios and questions, identified MEDLINE citations that answered the questions, and submitted daily and summative reports of their experience. A senior medical librarian corroborated the relevance of the selected citation to each scenario and question. Results Evaluators answered 68% of 363 background and foreground clinical questions during rounding sessions using a variety of MD on Tap features in an average session length of less than four minutes. The evaluator, the number and quality of query terms, the total number of citations found for a query, and the use of auto-spellcheck significantly contributed to the probability of query success. Conclusion Handheld computers with Internet access are useful tools for healthcare providers to access MEDLINE in real time. MEDLINE citations can answer specific clinical questions when several medical terms are used to form a query. The MD on Tap application is an effective interface to MEDLINE in clinical settings, allowing clinicians to quickly find relevant citations. PMID:17712085

  7. Electron Accelerator Shielding Design of KIPT Neutron Source Facility

    Directory of Open Access Journals (Sweden)

    Zhaopeng Zhong

    2016-06-01

    Full Text Available The Argonne National Laboratory of the United States and the Kharkov Institute of Physics and Technology of the Ukraine have been collaborating on the design, development and construction of a neutron source facility at Kharkov Institute of Physics and Technology utilizing an electron-accelerator-driven subcritical assembly. The electron beam power is 100 kW using 100-MeV electrons. The facility was designed to perform basic and applied nuclear research, produce medical isotopes, and train nuclear specialists. The biological shield of the accelerator building was designed to reduce the biological dose to less than 5.0e-03 mSv/h during operation. The main source of the biological dose for the accelerator building is the photons and neutrons generated from different interactions of leaked electrons from the electron gun and the accelerator sections with the surrounding components and materials. The Monte Carlo N-particle extended code (MCNPX was used for the shielding calculations because of its capability to perform electron-, photon-, and neutron-coupled transport simulations. The photon dose was tallied using the MCNPX calculation, starting with the leaked electrons. However, it is difficult to accurately tally the neutron dose directly from the leaked electrons. The neutron yield per electron from the interactions with the surrounding components is very small, ∼0.01 neutron for 100-MeV electron and even smaller for lower-energy electrons. This causes difficulties for the Monte Carlo analyses and consumes tremendous computation resources for tallying the neutron dose outside the shield boundary with an acceptable accuracy. To avoid these difficulties, the SOURCE and TALLYX user subroutines of MCNPX were utilized for this study. The generated neutrons were banked, together with all related parameters, for a subsequent MCNPX calculation to obtain the neutron dose. The weight windows variance reduction technique was also utilized for both

  8. Computing Expected Value of Partial Sample Information from Probabilistic Sensitivity Analysis Using Linear Regression Metamodeling.

    Science.gov (United States)

    Jalal, Hawre; Goldhaber-Fiebert, Jeremy D; Kuntz, Karen M

    2015-07-01

    Decision makers often desire both guidance on the most cost-effective interventions given current knowledge and also the value of collecting additional information to improve the decisions made (i.e., from value of information [VOI] analysis). Unfortunately, VOI analysis remains underused due to the conceptual, mathematical, and computational challenges of implementing Bayesian decision-theoretic approaches in models of sufficient complexity for real-world decision making. In this study, we propose a novel practical approach for conducting VOI analysis using a combination of probabilistic sensitivity analysis, linear regression metamodeling, and unit normal loss integral function--a parametric approach to VOI analysis. We adopt a linear approximation and leverage a fundamental assumption of VOI analysis, which requires that all sources of prior uncertainties be accurately specified. We provide examples of the approach and show that the assumptions we make do not induce substantial bias but greatly reduce the computational time needed to perform VOI analysis. Our approach avoids the need to analytically solve or approximate joint Bayesian updating, requires only one set of probabilistic sensitivity analysis simulations, and can be applied in models with correlated input parameters. © The Author(s) 2015.

  9. Improving communication when seeking informed consent: a randomised controlled study of a computer-based method for providing information to prospective clinical trial participants.

    Science.gov (United States)

    Karunaratne, Asuntha S; Korenman, Stanley G; Thomas, Samantha L; Myles, Paul S; Komesaroff, Paul A

    2010-04-05

    To assess the efficacy, with respect to participant understanding of information, of a computer-based approach to communication about complex, technical issues that commonly arise when seeking informed consent for clinical research trials. An open, randomised controlled study of 60 patients with diabetes mellitus, aged 27-70 years, recruited between August 2006 and October 2007 from the Department of Diabetes and Endocrinology at the Alfred Hospital and Baker IDI Heart and Diabetes Institute, Melbourne. Participants were asked to read information about a mock study via a computer-based presentation (n = 30) or a conventional paper-based information statement (n = 30). The computer-based presentation contained visual aids, including diagrams, video, hyperlinks and quiz pages. Understanding of information as assessed by quantitative and qualitative means. Assessment scores used to measure level of understanding were significantly higher in the group that completed the computer-based task than the group that completed the paper-based task (82% v 73%; P = 0.005). More participants in the group that completed the computer-based task expressed interest in taking part in the mock study (23 v 17 participants; P = 0.01). Most participants from both groups preferred the idea of a computer-based presentation to the paper-based statement (21 in the computer-based task group, 18 in the paper-based task group). A computer-based method of providing information may help overcome existing deficiencies in communication about clinical research, and may reduce costs and improve efficiency in recruiting participants for clinical trials.

  10. Computational Modeling of Space Physiology for Informing Spaceflight Countermeasure Design and Predictions of Efficacy

    Science.gov (United States)

    Lewandowski, B. E.; DeWitt, J. K.; Gallo, C. A.; Gilkey, K. M.; Godfrey, A. P.; Humphreys, B. T.; Jagodnik, K. M.; Kassemi, M.; Myers, J. G.; Nelson, E. S.; hide

    2017-01-01

    MOTIVATION: Spaceflight countermeasures mitigate the harmful effects of the space environment on astronaut health and performance. Exercise has historically been used as a countermeasure to physical deconditioning, and additional countermeasures including lower body negative pressure, blood flow occlusion and artificial gravity are being researched as countermeasures to spaceflight-induced fluid shifts. The NASA Digital Astronaut Project uses computational models of physiological systems to inform countermeasure design and to predict countermeasure efficacy.OVERVIEW: Computational modeling supports the development of the exercise devices that will be flown on NASAs new exploration crew vehicles. Biomechanical modeling is used to inform design requirements to ensure that exercises can be properly performed within the volume allocated for exercise and to determine whether the limited mass, volume and power requirements of the devices will affect biomechanical outcomes. Models of muscle atrophy and bone remodeling can predict device efficacy for protecting musculoskeletal health during long-duration missions. A lumped-parameter whole-body model of the fluids within the body, which includes the blood within the cardiovascular system, the cerebral spinal fluid, interstitial fluid and lymphatic system fluid, estimates compartmental changes in pressure and volume due to gravitational changes. These models simulate fluid shift countermeasure effects and predict the associated changes in tissue strain in areas of physiological interest to aid in predicting countermeasure effectiveness. SIGNIFICANCE: Development and testing of spaceflight countermeasure prototypes are resource-intensive efforts. Computational modeling can supplement this process by performing simulations that reduce the amount of necessary experimental testing. Outcomes of the simulations are often important for the definition of design requirements and the identification of factors essential in ensuring

  11. Impact of familiarity on information complexity in human-computer interfaces

    Directory of Open Access Journals (Sweden)

    Bakaev Maxim

    2016-01-01

    Full Text Available A quantitative measure of information complexity remains very much desirable in HCI field, since it may aid in optimization of user interfaces, especially in human-computer systems for controlling complex objects. Our paper is dedicated to exploration of subjective (subject-depended aspect of the complexity, conceptualized as information familiarity. Although research of familiarity in human cognition and behaviour is done in several fields, the accepted models in HCI, such as Human Processor or Hick-Hyman’s law do not generally consider this issue. In our experimental study the subjects performed search and selection of digits and letters, whose familiarity was conceptualized as frequency of occurrence in numbers and texts. The analysis showed significant effect of information familiarity on selection time and throughput in regression models, although the R2 values were somehow low. Still, we hope that our results might aid in quantification of information complexity and its further application for optimizing interaction in human-machine systems.

  12. Information theory analysis of sensor-array imaging systems for computer vision

    Science.gov (United States)

    Huck, F. O.; Fales, C. L.; Park, S. K.; Samms, R. W.; Self, M. O.

    1983-01-01

    Information theory is used to assess the performance of sensor-array imaging systems, with emphasis on the performance obtained with image-plane signal processing. By electronically controlling the spatial response of the imaging system, as suggested by the mechanism of human vision, it is possible to trade-off edge enhancement for sensitivity, increase dynamic range, and reduce data transmission. Computational results show that: signal information density varies little with large variations in the statistical properties of random radiance fields; most information (generally about 85 to 95 percent) is contained in the signal intensity transitions rather than levels; and performance is optimized when the OTF of the imaging system is nearly limited to the sampling passband to minimize aliasing at the cost of blurring, and the SNR is very high to permit the retrieval of small spatial detail from the extensively blurred signal. Shading the lens aperture transmittance to increase depth of field and using a regular hexagonal sensor-array instead of square lattice to decrease sensitivity to edge orientation also improves the signal information density up to about 30 percent at high SNRs.

  13. Network Intelligence Based on Network State Information for Connected Vehicles Utilizing Fog Computing

    Directory of Open Access Journals (Sweden)

    Seongjin Park

    2017-01-01

    Full Text Available This paper proposes a method to take advantage of fog computing and SDN in the connected vehicle environment, where communication channels are unstable and the topology changes frequently. A controller knows the current state of the network by maintaining the most recent network topology. Of all the information collected by the controller in the mobile environment, node mobility information is particularly important. Thus, we divide nodes into three classes according to their mobility types and use their related attributes to efficiently manage the mobile connections. Our approach utilizes mobility information to reduce control message overhead by adjusting the period of beacon messages and to support efficient failure recovery. One is to recover the connection failures using only mobility information, and the other is to suggest a real-time scheduling algorithm to recover the services for the vehicles that lost connection in the case of a fog server failure. A real-time scheduling method is first described and then evaluated. The results show that our scheme is effective in the connected vehicle environment. We then demonstrate the reduction of control overhead and the connection recovery by using a network simulator. The simulation results show that control message overhead and failure recovery time are decreased by approximately 55% and 5%, respectively.

  14. Understanding Networks of Computing Chemical Droplet Neurons Based on Information Flow.

    Science.gov (United States)

    Gruenert, Gerd; Gizynski, Konrad; Escuela, Gabi; Ibrahim, Bashar; Gorecki, Jerzy; Dittrich, Peter

    2015-11-01

    In this paper, we present general methods that can be used to explore the information processing potential of a medium composed of oscillating (self-exciting) droplets. Networks of Belousov-Zhabotinsky (BZ) droplets seem especially interesting as chemical reaction-diffusion computers because their time evolution is qualitatively similar to neural network activity. Moreover, such networks can be self-generated in microfluidic reactors. However, it is hard to track and to understand the function performed by a medium composed of droplets due to its complex dynamics. Corresponding to recurrent neural networks, the flow of excitations in a network of droplets is not limited to a single direction and spreads throughout the whole medium. In this work, we analyze the operation performed by droplet systems by monitoring the information flow. This is achieved by measuring mutual information and time delayed mutual information of the discretized time evolution of individual droplets. To link the model with reality, we use experimental results to estimate the parameters of droplet interactions. We exemplarily investigate an evolutionary generated droplet structure that operates as a NOR gate. The presented methods can be applied to networks composed of at least hundreds of droplets.

  15. Chemistry and radiative shielding in star-forming galactic discs

    Science.gov (United States)

    Safranek-Shrader, Chalence; Krumholz, Mark R.; Kim, Chang-Goo; Ostriker, Eve C.; Klein, Richard I.; Li, Shule; McKee, Christopher F.; Stone, James M.

    2017-02-01

    To understand the conditions under which dense, molecular gas is able to form within a galaxy, we post-process a series of three-dimensional galactic-disc-scale simulations with ray-tracing-based radiative transfer and chemical network integration to compute the equilibrium chemical and thermal state of the gas. In performing these simulations, we vary a number of parameters, such as the interstellar radiation field strength, vertical scaleheight of stellar sources, and cosmic ray flux, to gauge the sensitivity of our results to these variations. Self-shielding permits significant molecular hydrogen (H2) abundances in dense filaments around the disc mid-plane, accounting for approximately ˜10-15 per cent of the total gas mass. Significant CO fractions only form in the densest, nH≳ 10^3 cm^{-3}, gas where a combination of dust, H2, and self-shielding attenuates the far-ultraviolet background. We additionally compare these ray-tracing-based solutions to photochemistry with complementary models where photoshielding is accounted for with locally computed prescriptions. With some exceptions, these local models for the radiative shielding length perform reasonably well at reproducing the distribution and amount of molecular gas as compared with a detailed, global ray-tracing calculation. Specifically, an approach based on the Jeans length with a T = 40 K temperature cap performs the best in regard to a number of different quantitative measures based on the H2 and CO abundances.

  16. Proceedings of the Workshop on Methods & Tools for Computer Supported Collaborative Creativity Process: Linking creativity & informal learning

    NARCIS (Netherlands)

    Retalis, Symeon; Sloep, Peter

    2009-01-01

    Retalis, S., & Sloep, P. B. (Eds.) (2009). Collection of 4 symposium papers at EC-TEL 2009. Proceedings of the Workshop on Methods & Tools for Computer Supported Collaborative Creativity Process: Linking creativity & informal learning. September, 30, 2009, Nice,

  17. Clinicians’ perceptions and the relevant computer-based information needs towards the practice of evidence based medicine

    Science.gov (United States)

    Jiang, Guoqian; Ogasawara, Katsuhiko; Endoh, Akira; Sakurai, Tsunetaro

    2003-01-01

    We conducted a survey among 100 clinicians in a university hospital to determine the clinician’s attitudes and the relevant computer-based information needs towards the practice of evidence-based medicine in outpatient setting. PMID:14728387

  18. Design Considerations of Help Options in Computer-Based L2 Listening Materials Informed by Participatory Design

    Science.gov (United States)

    Cárdenas-Claros, Mónica Stella

    2015-01-01

    This paper reports on the findings of two qualitative exploratory studies that sought to investigate design features of help options in computer-based L2 listening materials. Informed by principles of participatory design, language learners, software designers, language teachers, and a computer programmer worked collaboratively in a series of…

  19. The relationship between students’ use of ICT for social communication and their computer and information literacy

    Directory of Open Access Journals (Sweden)

    Meral Alkan

    2016-09-01

    Full Text Available Abstract This study investigates the relationship between students’ use of information and communication technology (ICT for social communication and their computer and information literacy (CIL scores. It also examines whether gender and socioeconomic background moderates this relationship. We utilized student data from IEA’s International Computer and Information Study (ICILS to build multivariate regression models for answering the research questions, and accounted for the complex sample structure of the data by using weights for all statistical analyses, employing jackknife repeated replication for variance estimation. Students who frequently use the internet for messaging and participation in social networks (i.e., at least once a week scored on average 44 points higher than those who use ICT for the same purpose only less than once a week or never. The direction of this effect was the same in all 21 participating educational systems, the difference ranging from 19 to 75 points (always statistically significant. We continued the analysis by testing whether the relationship is moderated by gender; as girls use more often ICT for social communication and have higher CIL scores on average. After controlling for the gender effect the CIL scores between the two examined groups decreased only by 2 points on average. Even after including students’ socio-economic background into the model, the difference in CIL between the two groups of interest declined only little—to 32 points on average across all countries. The difference remained to be statistically significant in all countries but one. The results suggest a strong relationship between students’ CIL proficiency level and the frequency of their use of electronic devices for social communication; hence, respective skills needed at schools and later on at the workplace are reflected in their use outside of school and for socializing.

  20. Efficient physical embedding of topologically complex information processing networks in brains and computer circuits.

    Directory of Open Access Journals (Sweden)

    Danielle S Bassett

    2010-04-01

    Full Text Available Nervous systems are information processing networks that evolved by natural selection, whereas very large scale integrated (VLSI computer circuits have evolved by commercially driven technology development. Here we follow historic intuition that all physical information processing systems will share key organizational properties, such as modularity, that generally confer adaptivity of function. It has long been observed that modular VLSI circuits demonstrate an isometric scaling relationship between the number of processing elements and the number of connections, known as Rent's rule, which is related to the dimensionality of the circuit's interconnect topology and its logical capacity. We show that human brain structural networks, and the nervous system of the nematode C. elegans, also obey Rent's rule, and exhibit some degree of hierarchical modularity. We further show that the estimated Rent exponent of human brain networks, derived from MRI data, can explain the allometric scaling relations between gray and white matter volumes across a wide range of mammalian species, again suggesting that these principles of nervous system design are highly conserved. For each of these fractal modular networks, the dimensionality of the interconnect topology was greater than the 2 or 3 Euclidean dimensions of the space in which it was embedded. This relatively high complexity entailed extra cost in physical wiring: although all networks were economically or cost-efficiently wired they did not strictly minimize wiring costs. Artificial and biological information processing systems both may evolve to optimize a trade-off between physical cost and topological complexity, resulting in the emergence of homologous principles of economical, fractal and modular design across many different kinds of nervous and computational networks.

  1. Efficient physical embedding of topologically complex information processing networks in brains and computer circuits.

    Science.gov (United States)

    Bassett, Danielle S; Greenfield, Daniel L; Meyer-Lindenberg, Andreas; Weinberger, Daniel R; Moore, Simon W; Bullmore, Edward T

    2010-04-22

    Nervous systems are information processing networks that evolved by natural selection, whereas very large scale integrated (VLSI) computer circuits have evolved by commercially driven technology development. Here we follow historic intuition that all physical information processing systems will share key organizational properties, such as modularity, that generally confer adaptivity of function. It has long been observed that modular VLSI circuits demonstrate an isometric scaling relationship between the number of processing elements and the number of connections, known as Rent's rule, which is related to the dimensionality of the circuit's interconnect topology and its logical capacity. We show that human brain structural networks, and the nervous system of the nematode C. elegans, also obey Rent's rule, and exhibit some degree of hierarchical modularity. We further show that the estimated Rent exponent of human brain networks, derived from MRI data, can explain the allometric scaling relations between gray and white matter volumes across a wide range of mammalian species, again suggesting that these principles of nervous system design are highly conserved. For each of these fractal modular networks, the dimensionality of the interconnect topology was greater than the 2 or 3 Euclidean dimensions of the space in which it was embedded. This relatively high complexity entailed extra cost in physical wiring: although all networks were economically or cost-efficiently wired they did not strictly minimize wiring costs. Artificial and biological information processing systems both may evolve to optimize a trade-off between physical cost and topological complexity, resulting in the emergence of homologous principles of economical, fractal and modular design across many different kinds of nervous and computational networks.

  2. Comprehensive overview of computer-based health information tailoring: a scoping review protocol.

    Science.gov (United States)

    Ghalibaf, Azadeh Kamel; Nazari, Elham; Gholian-Aval, Mahdi; Tabesh, Hamed; Tara, Mahmood

    2017-12-27

    Tailoring health information to the needs of individuals has become an important part of modern health communications. Tailoring has been addressed by researchers from different disciplines leading to the emergence of a wide range of approaches, making the newcomers confused. In order to address this, a comprehensive overview of the field with the indications of research gaps, tendencies and trends will be helpful. As a result, a systematic protocol was outlined to conduct a scoping review within the field of computer-based health information tailoring. This protocol is based on the York's five-stage framework outlined by Arksey and O'Malley. A field-specific structure was defined as a basis for undertaking each stage. The structure comprised three main aspects: system design, information communication and evaluation. Five leading databases were searched: PubMed, Scopus, Science Direct, EBSCO and IEEE and a broad search strategy was used with less strict inclusion criteria to cover the breadth of evidence. Theoretical frameworks were used to develop the data extraction form and a rigorous approach was introduced to identify the categories from data. Several explanatory-descriptive methods were considered to analyse the data, from which some were proposed to be employed for the first time in scoping studies. This study investigates the breadth and depth of existing literature on computer-tailoring and as a secondary analysis, does not require ethics approval. We anticipate that the results will identify research gaps and novel ideas for future studies and provide direction to combine methods from different disciplines. The research findings will be submitted for publication to relevant peer-reviewed journals and conferences targeting health promotion and patient education. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  3. Efficacy of computer-based endoscope cleaning and disinfection using a hospital management information system.

    Science.gov (United States)

    Wang, Caixia; Chen, Yuanyuan; Yang, Feng; Ren, Jie; Yu, Xin; Wang, Jiani; Sun, Siyu

    2016-08-01

    The present study aimed to assess the efficacy of computer-based endoscope cleaning and disinfection using a hospital management information system (HMIS). A total of 2,674 gastroscopes were eligible for inclusion in this study. For the processes of disinfection management, the gastroscopes were randomly divided into 2 groups: gastroscope disinfection HMIS (GD-HMIS) group and manual group. In the GD-HMIS group, an integrated circuit card (IC card) chip was installed to monitor and record endoscope cleaning and disinfection automatically and in real time, whereas the endoscope cleaning and disinfection in the manual group was recorded manually. The overall disinfection progresses for both groups were recorded, and the total operational time was calculated. For the GD-HMIS group, endoscope disinfection HMIS software was successfully developed. The time to complete a single session of cleaning and disinfecting on a gastroscope was 15.6 minutes (range, 14.3-17.2 minutes) for the GD-HMIS group and 21.3 minutes (range, 20.2-23.9 minutes) for the manual group. Failure to record information, such as the identification number of the endoscope, occasionally occurred in the manual group, which affected the accuracy and reliability of manual recording. Computer-based gastroscope cleaning and disinfection using a hospital management information system could monitor the process of gastroscope cleaning and disinfection in real time and improve the accuracy and reliability, thereby ensuring the quality of gastroscope cleaning and disinfection. Copyright © 2016 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  4. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview In autumn the main focus was to process and handle CRAFT data and to perform the Summer08 MC production. The operational aspects were well covered by regular Computing Shifts, experts on duty and Computing Run Coordination. At the Computing Resource Board (CRB) in October a model to account for service work at Tier 2s was approved. The computing resources for 2009 were reviewed for presentation at the C-RRB. The quarterly resource monitoring is continuing. Facilities/Infrastructure operations Operations during CRAFT data taking ran fine. This proved to be a very valuable experience for T0 workflows and operations. The transfers of custodial data to most T1s went smoothly. A first round of reprocessing started at the Tier-1 centers end of November; it will take about two weeks. The Computing Shifts procedure was tested full scale during this period and proved to be very efficient: 30 Computing Shifts Persons (CSP) and 10 Computing Resources Coordinators (CRC). The shift program for the shut down w...

  5. Experimental Shielding Evaluation of the Radiation Protection Provided by Residential Structures

    Science.gov (United States)

    Dickson, Elijah D.

    The human health and environmental effects following a postulated accidental release of radioactive material to the environment has been a public and regulatory concern since the early development of nuclear technology and researched extensively to better understand the potential risks for accident mitigation and emergency planning purposes. The objective of this investigation is to research and develop the technical basis for contemporary building shielding factors for the U.S. housing stock. Building shielding factors quantify the protection a certain building-type provides from ionizing radiation. Much of the current data used to determine the quality of shielding around nuclear facilities and urban environments is based on simplistic point-kernel calculations for 1950's era suburbia and is no longer applicable to the densely populated urban environments seen today. To analyze a building's radiation shielding properties, the ideal approach would be to subject a variety of building-types to various radioactive materials and measure the radiation levels in and around the building. While this is not entirely practicable, this research uniquely analyzes the shielding effectiveness of a variety of likely U.S. residential buildings from a realistic source term in a laboratory setting. Results produced in the investigation provide a comparison between theory and experiment behind building shielding factor methodology by applying laboratory measurements to detailed computational models. These models are used to develop a series of validated building shielding factors for generic residential housing units using the computational code MCNP5. For these building shielding factors to be useful in radiologic consequence assessments and emergency response planning, two types of shielding factors have been developed for; (1) the shielding effectiveness of each structure within a semi-infinite cloud of radioactive material, and (2) the shielding effectiveness of each structure

  6. Add-On Shielding for Unshielded Wire

    Science.gov (United States)

    Koenig, J. C.; Billitti, J. W.; Tallon, J. M.

    1983-01-01

    Fabrication sequence used to produce compact shields slipped into place from free ends of wires already soldered into connectors at other ends. Single shields are formed into harnesses by connecting grounding jumpers. Technique is especially useful for small diameter wire attached to microminiature connectors.

  7. Thermal neutron shield and method of manufacture

    Science.gov (United States)

    Brindza, Paul Daniel; Metzger, Bert Clayton

    2013-05-28

    A thermal neutron shield comprising concrete with a high percentage of the element Boron. The concrete is least 54% Boron by weight which maximizes the effectiveness of the shielding against thermal neutrons. The accompanying method discloses the manufacture of Boron loaded concrete which includes enriching the concrete mixture with varying grit sizes of Boron Carbide.

  8. Artificial Dielectric Shields for Integrated Transmission Lines

    NARCIS (Netherlands)

    Ma, Y.; Rejaei, B.; Zhuang, Y.

    2008-01-01

    We present a novel shielding method for on-chip transmission lines built on conductive silicon substrates. The shield consists of an artificial dielectric with a very high in-plane dielectric constant, built from two patterned metal layers isolated by a very thin dielectric film. Inserted below an

  9. Infrared shield facilitates optical pyrometer measurements

    Science.gov (United States)

    Eichenbrenner, F. F.; Illg, W.

    1965-01-01

    Water-cooled shield facilitates optical pyrometer high temperature measurements of small sheet metal specimens subjected to tensile stress in fatigue tests. The shield excludes direct or reflected radiation from one face of the specimen and permits viewing of the infrared radiation only.

  10. The Role of Informative and Ambiguous Feedback in Avoidance Behavior: Empirical and Computational Findings.

    Science.gov (United States)

    Moustafa, Ahmed A; Sheynin, Jony; Myers, Catherine E

    2015-01-01

    Avoidance behavior is a critical component of many psychiatric disorders, and as such, it is important to understand how avoidance behavior arises, and whether it can be modified. In this study, we used empirical and computational methods to assess the role of informational feedback and ambiguous outcome in avoidance behavior. We adapted a computer-based probabilistic classification learning task, which includes positive, negative and no-feedback outcomes; the latter outcome is ambiguous as it might signal either a successful outcome (missed punishment) or a failure (missed reward). Prior work with this task suggested that most healthy subjects viewed the no-feedback outcome as strongly positive. Interestingly, in a later version of the classification task, when healthy subjects were allowed to opt out of (i.e. avoid) responding, some subjects ("avoiders") reliably avoided trials where there was a risk of punishment, but other subjects ("non-avoiders") never made any avoidance responses at all. One possible interpretation is that the "non-avoiders" valued the no-feedback outcome so positively on punishment-based trials that they had little incentive to avoid. Another possible interpretation is that the outcome of an avoided trial is unspecified and that lack of information is aversive, decreasing subjects' tendency to avoid. To examine these ideas, we here tested healthy young adults on versions of the task where avoidance responses either did or did not generate informational feedback about the optimal response. Results showed that provision of informational feedback decreased avoidance responses and also decreased categorization performance, without significantly affecting the percentage of subjects classified as "avoiders." To better understand these results, we used a modified Q-learning model to fit individual subject data. Simulation results suggest that subjects in the feedback condition adjusted their behavior faster following better-than-expected outcomes

  11. The Role of Informative and Ambiguous Feedback in Avoidance Behavior: Empirical and Computational Findings.

    Directory of Open Access Journals (Sweden)

    Ahmed A Moustafa

    Full Text Available Avoidance behavior is a critical component of many psychiatric disorders, and as such, it is important to understand how avoidance behavior arises, and whether it can be modified. In this study, we used empirical and computational methods to assess the role of informational feedback and ambiguous outcome in avoidance behavior. We adapted a computer-based probabilistic classification learning task, which includes positive, negative and no-feedback outcomes; the latter outcome is ambiguous as it might signal either a successful outcome (missed punishment or a failure (missed reward. Prior work with this task suggested that most healthy subjects viewed the no-feedback outcome as strongly positive. Interestingly, in a later version of the classification task, when healthy subjects were allowed to opt out of (i.e. avoid responding, some subjects ("avoiders" reliably avoided trials where there was a risk of punishment, but other subjects ("non-avoiders" never made any avoidance responses at all. One possible interpretation is that the "non-avoiders" valued the no-feedback outcome so positively on punishment-based trials that they had little incentive to avoid. Another possible interpretation is that the outcome of an avoided trial is unspecified and that lack of information is aversive, decreasing subjects' tendency to avoid. To examine these ideas, we here tested healthy young adults on versions of the task where avoidance responses either did or did not generate informational feedback about the optimal response. Results showed that provision of informational feedback decreased avoidance responses and also decreased categorization performance, without significantly affecting the percentage of subjects classified as "avoiders." To better understand these results, we used a modified Q-learning model to fit individual subject data. Simulation results suggest that subjects in the feedback condition adjusted their behavior faster following better

  12. How Concentration Shields Against Distraction.

    Science.gov (United States)

    Sörqvist, Patrik; Marsh, John E

    2015-08-01

    In this article, we outline our view of how concentration shields against distraction. We argue that higher levels of concentration make people less susceptible to distraction for two reasons. One reason is that the undesired processing of the background environment is reduced. For example, when people play a difficult video game, as opposed to an easy game, they are less likely to notice what people in the background are saying. The other reason is that the locus of attention becomes more steadfast. For example, when people are watching an entertaining episode of their favorite television series, as opposed to a less absorbing show, attention is less likely to be diverted away from the screen by a ringing telephone. The theoretical underpinnings of this perspective, and potential implications for applied settings, are addressed.

  13. Radiation Shielding Systems Using Nanotechnology

    Science.gov (United States)

    Chen, Bin (Inventor); McKay, Christoper P. (Inventor)

    2011-01-01

    A system for shielding personnel and/or equipment from radiation particles. In one embodiment, a first substrate is connected to a first array or perpendicularly oriented metal-like fingers, and a second, electrically conducting substrate has an array of carbon nanostructure (CNS) fingers, coated with an electro-active polymer extending toward, but spaced apart from, the first substrate fingers. An electric current and electric charge discharge and dissipation system, connected to the second substrate, receives a current and/or voltage pulse initially generated when the first substrate receives incident radiation. In another embodiment, an array of CNSs is immersed in a first layer of hydrogen-rich polymers and in a second layer of metal-like material. In another embodiment, a one- or two-dimensional assembly of fibers containing CNSs embedded in a metal-like matrix serves as a radiation-protective fabric or body covering.

  14. COMPUTING

    CERN Multimedia

    M. Kasemann

    Overview During the past three months activities were focused on data operations, testing and re-enforcing shift and operational procedures for data production and transfer, MC production and on user support. Planning of the computing resources in view of the new LHC calendar in ongoing. Two new task forces were created for supporting the integration work: Site Commissioning, which develops tools helping distributed sites to monitor job and data workflows, and Analysis Support, collecting the user experience and feedback during analysis activities and developing tools to increase efficiency. The development plan for DMWM for 2009/2011 was developed at the beginning of the year, based on the requirements from the Physics, Computing and Offline groups (see Offline section). The Computing management meeting at FermiLab on February 19th and 20th was an excellent opportunity discussing the impact and for addressing issues and solutions to the main challenges facing CMS computing. The lack of manpower is particul...

  15. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction CMS distributed computing system performed well during the 2011 start-up. The events in 2011 have more pile-up and are more complex than last year; this results in longer reconstruction times and harder events to simulate. Significant increases in computing capacity were delivered in April for all computing tiers, and the utilisation and load is close to the planning predictions. All computing centre tiers performed their expected functionalities. Heavy-Ion Programme The CMS Heavy-Ion Programme had a very strong showing at the Quark Matter conference. A large number of analyses were shown. The dedicated heavy-ion reconstruction facility at the Vanderbilt Tier-2 is still involved in some commissioning activities, but is available for processing and analysis. Facilities and Infrastructure Operations Facility and Infrastructure operations have been active with operations and several important deployment tasks. Facilities participated in the testing and deployment of WMAgent and WorkQueue+Request...

  16. COMPUTING

    CERN Multimedia

    P. McBride

    The Computing Project is preparing for a busy year where the primary emphasis of the project moves towards steady operations. Following the very successful completion of Computing Software and Analysis challenge, CSA06, last fall, we have reorganized and established four groups in computing area: Commissioning, User Support, Facility/Infrastructure Operations and Data Operations. These groups work closely together with groups from the Offline Project in planning for data processing and operations. Monte Carlo production has continued since CSA06, with about 30M events produced each month to be used for HLT studies and physics validation. Monte Carlo production will continue throughout the year in the preparation of large samples for physics and detector studies ramping to 50 M events/month for CSA07. Commissioning of the full CMS computing system is a major goal for 2007. Site monitoring is an important commissioning component and work is ongoing to devise CMS specific tests to be included in Service Availa...

  17. Cloud Computing Integrated Multi-Factor Authentication Framework Application in Logistics Information Systems

    Directory of Open Access Journals (Sweden)

    Zeynel Erdi Karabulut

    2017-12-01

    Full Text Available As new technology enables firms to perform many daily processes easier the need of authentication and authorization process is becoming an integral part of many businesses. Also mobile applications are very popular nowadays play an important role in our lives. Such demands are not only limited to Logistics Information Systems (LIS but many field of information system as well. In this study multi-dimensional authentication which consist of online biometric face detection integrated as cloud computing software as a Service (SaaS, Near Field Communication (NFC card authentication, location confirmation, and temporal data confirmation are gathered together to fulfill different scenarios of authentication needs of business. Microsoft Face API (Application Program Interface, SAAS (software as a service has been used in face recognition module of developed mobile application. The face recognition module of the mobile application has been tested with Yale Face Database. Location, temporal data and NFC card information are collected and confirmed by the mobile application for authentication and authorization. These images were tested with our facial recognition module and confusion matrices were created. The accuracy of the system after the facial recognition test was found to be 100%. NFC card, location and temporal data authentication not only further increases security level but also fulfils many business authentication scenarios successfully. To the best of our knowledge there is no other authentication model other than implemented one that has a-4-factor confirmation including biometric face identification, NFC card authentication, location confirmation and temporal data confirmation.

  18. A lack of appetite for information and computation. Simple heuristics in food choice.

    Science.gov (United States)

    Schulte-Mecklenbeck, Michael; Sohn, Matthias; de Bellis, Emanuel; Martin, Nathalie; Hertwig, Ralph

    2013-12-01

    The predominant, but largely untested, assumption in research on food choice is that people obey the classic commandments of rational behavior: they carefully look up every piece of relevant information, weight each piece according to subjective importance, and then combine them into a judgment or choice. In real world situations, however, the available time, motivation, and computational resources may simply not suffice to keep these commandments. Indeed, there is a large body of research suggesting that human choice is often better accommodated by heuristics-simple rules that enable decision making on the basis of a few, but important, pieces of information. We investigated the prevalence of such heuristics in a computerized experiment that engaged participants in a series of choices between two lunch dishes. Employing MouselabWeb, a process-tracing technique, we found that simple heuristics described an overwhelmingly large proportion of choices, whereas strategies traditionally deemed rational were barely apparent in our data. Replicating previous findings, we also observed that visual stimulus segments received a much larger proportion of attention than any nutritional values did. Our results suggest that, consistent with human behavior in other domains, people make their food choices on the basis of simple and informationally frugal heuristics. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. Multi-Interactive Teaching Model of College English in Computer Information Technology Environment

    Directory of Open Access Journals (Sweden)

    Jianlan Wen

    2017-12-01

    Full Text Available The multi-interactive teaching mode of college English takes students as the center and the task as the link, realizing the combination of classroom teaching and network-based autonomous learning in information technology environment. This teaching model is characterized by integrated teaching methods, open teaching environment and hierarchical teaching management compared with the traditional classroom teaching methods. This paper took the interactive teaching model of college English based on computer information technology as the research object and the "construction", "interaction" and "cooperation" as the core guiding ideology based on the learning theory of constructivism and communicative theory, guiding the design of listening, speaking and reading experiments in college English teaching under the multi-interactive teaching model. This paper first described the application and concept of multivariate interactive teaching mode, and then introduced the related learning theories. By selecting non-English major college students of 2015 from Hunan Normal University as the application object of multi-interactive teaching model, this paper validated the effectiveness of multi-interactive teaching model for college English teaching through detailed teaching experimental design and comparative analysis of teaching achievements. Under the background of the rapid development of information technology, the new multi-interactive teaching mode opens up the multi-dimensional and multi-form language learning process, which is of innovative and practical significance for the teaching of college English.

  20. Frequency dependence of magnetic shielding performance of HTS plates in mixed states

    Energy Technology Data Exchange (ETDEWEB)

    Kamitani, Atsushi; Yokono, Takafumi [Yamagata Univ., Yonezawa (Japan). Faculty of Engineering; Yokono, Takafumi [Tsukuba Univ., Ibaraki (Japan). Inst. of Information Sciences and Electronics

    2000-06-01

    The magnetic shielding performance of the high-Tc superconducting (HTS) plate is investigated numerically. The behavior of the shielding current density in the HTS plate is expressed as the integral-differential equation with a normal component of the current vector potential as a dependent variable. The numerical code for solving the equation has been developed by using the combination of the Newton-Raphson method and the successive substitution method and, by use of the code, damping coefficients and shielding factors are evaluated for the various values of the frequency {omega}. The results of computations show that the HTS plate has a possibility of shielding the high-frequency magnetic field with {omega} > or approx. 1 kHz. (author)

  1. Architecture and data processing alternatives for the TSE computer. Volume 2: Extraction of topological information from an image by the Tse computer

    Science.gov (United States)

    Jones, J. R.; Bodenheimer, R. E.

    1976-01-01

    A simple programmable Tse processor organization and arithmetic operations necessary for extraction of the desired topological information are described. Hardware additions to this organization are discussed along with trade-offs peculiar to the tse computing concept. An improved organization is presented along with the complementary software for the various arithmetic operations. The performance of the two organizations is compared in terms of speed, power, and cost. Software routines developed to extract the desired information from an image are included.

  2. The use of nipple shields: A review

    Directory of Open Access Journals (Sweden)

    Selina Chow

    2016-11-01

    Full Text Available A nipple shield is a breastfeeding aid with a nipple-shaped shield that is positioned over the nipple and areola prior to nursing. Nipple shields are usually recommended to mothers with flat nipples or in cases in which there is a failure of the baby to effectively latch onto the breast within the first two days postpartum. The use of nipple shields is a controversial topic in the field of lactation. Its use has been an issue in the clinical literature since some older studies discovered reduced breast milk transfer when using nipple shields, while more recent studies reported successful breastfeeding outcomes. The purpose of this review was to examine the evidence and outcomes with nipple shield use. Methods: A literature search was conducted in Ovid MEDLINE, OLDMEDLINE, EMBASE Classic, EMBASE, Cochrane Central Register of Controlled Trials and CINAHL. The primary endpoint was any breastfeeding outcome following nipple shield use. Secondary endpoints included the reasons for nipple shield use and the average/median length of use. For the analysis, we examined the effect of nipple shield use on physiological responses, premature infants, mothers’ experiences, and health professionals’ experiences. Results: The literature search yielded 261 articles, 14 of which were included in this review. Of these 14 articles, three reported on physiological responses, two reported on premature infants, eight reported on mothers’ experiences, and one reported on health professionals’ experiences. Conclusion: Through examining the use of nipple shields, further insight is provided on the advantages and disadvantages of this practice, thus allowing clinicians and researchers to address improvements on areas that will benefit mothers and infants the most.

  3. Performance reports for EIM (Engineering Information Management) computer systems: A managerial perspective

    Energy Technology Data Exchange (ETDEWEB)

    Wenderlich, N.D.; Reid, R.A.

    1989-07-01

    This document describes twelve different kinds of charts which have been designed to help manage the performance of the Engineering Information Management (EIM) computer systems at Sandia National Laboratories Albuquerque. Operational data generated by the two major software systems, Multiple Virtual Storage (MVS) and Integrated Database Management System (IDMS), are summarized to visually portray actual service levels and meaningful system performance characteristics. To demonstrate the potential utility of the resulting performance reports, summarized data in illustrative charts are evaluated from a managerial point of view. The resulting graphs can stimulate relevant analyses for modeling the impact of forecasted workloads on system service level objectives and identifying problems or trends that need the attention of system tuners. 15 figs.

  4. 2nd World Congress on Computer Science and Information Engineering (CSIE 2011)

    CERN Document Server

    Cao, Lei; Su, Weilian; Wang, Tingkai; Yang, Huamin; Recent Advances in Computer Science and Information Engineering : Volume 4

    2012-01-01

    CSIE 2011 is an international scientific Congress for distinguished scholars engaged in scientific, engineering and technological research, dedicated to build a platform for exploring and discussing the future of Computer Science and Information Engineering with existing and potential application scenarios. The congress has been held twice, in Los Angeles, USA for the first and in Changchun, China for the second time, each of which attracted a large number of researchers from all over the world. The congress turns out to develop a spirit of cooperation that leads to new friendship for addressing a wide variety of ongoing problems in this vibrant area of technology and fostering more collaboration over the world.   The congress, CSIE 2011, received 2483 full paper and abstract submissions from 27 countries and regions over the world. Through a rigorous peer review process, all submissions were refereed based on their quality of content, level of innovation, significance, originality and legibility. 688 papers...

  5. Efficient acceleration of mutual information computation for nonrigid registration using CUDA.

    Science.gov (United States)

    Ikeda, Kei; Ino, Fumihiko; Hagihara, Kenichi

    2014-05-01

    In this paper, we propose an efficient acceleration method for the nonrigid registration of multimodal images that uses a graphics processing unit. The key contribution of our method is efficient utilization of on-chip memory for both normalized mutual information (NMI) computation and hierarchical B-spline deformation, which compose a well-known registration algorithm. We implement this registration algorithm as a compute unified device architecture program with an efficient parallel scheme and several optimization techniques such as hierarchical data organization, data reuse, and multiresolution representation. We experimentally evaluate our method with four clinical datasets consisting of up to 512 × 512 × 296 voxels. We find that exploitation of on-chip memory achieves a 12-fold increase in speed over an off-chip memory version and, therefore, it increases the efficiency of parallel execution from 4% to 46%. We also find that our method running on a GeForce GTX 580 card is approximately 14 times faster than a fully optimized CPU-based implementation running on four cores. Some multimodal registration results are also provided to understand the limitation of our method. We believe that our highly efficient method, which completes an alignment task within a few tens of seconds, will be useful to realize rapid nonrigid registration.

  6. Smart Collaborative Caching for Information-Centric IoT in Fog Computing

    Directory of Open Access Journals (Sweden)

    Fei Song

    2017-11-01

    Full Text Available The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies.

  7. Analog Computer-Aided Detection (CAD) information can be more effective than binary marks.

    Science.gov (United States)

    Cunningham, Corbin A; Drew, Trafton; Wolfe, Jeremy M

    2017-02-01

    In socially important visual search tasks, such as baggage screening and diagnostic radiology, experts miss more targets than is desirable. Computer-aided detection (CAD) programs have been developed specifically to improve performance in these professional search tasks. For example, in breast cancer screening, many CAD systems are capable of detecting approximately 90% of breast cancer, with approximately 0.5 false-positive detections per image. Nevertheless, benefits of CAD in clinical settings tend to be small (Birdwell, 2009) or even absent (Meziane et al., 2011; Philpotts, 2009). The marks made by a CAD system can be "binary," giving the same signal to any location where the signal is above some threshold. Alternatively, a CAD system presents an analog signal that reflects strength of the signal at a location. In the experiments reported, we compare analog and binary CAD presentations using nonexpert observers and artificial stimuli defined by two noisy signals: a visible color signal and an "invisible" signal that informed our simulated CAD system. We found that analog CAD generally yielded better overall performance than binary CAD. The analog benefit is similar at high and low target prevalence. Our data suggest that the form of the CAD signal can directly influence performance. Analog CAD may allow the computer to be more helpful to the searcher.

  8. Smart Collaborative Caching for Information-Centric IoT in Fog Computing.

    Science.gov (United States)

    Song, Fei; Ai, Zheng-Yang; Li, Jun-Jie; Pau, Giovanni; Collotta, Mario; You, Ilsun; Zhang, Hong-Ke

    2017-11-01

    The significant changes enabled by the fog computing had demonstrated that Internet of Things (IoT) urgently needs more evolutional reforms. Limited by the inflexible design philosophy; the traditional structure of a network is hard to meet the latest demands. However, Information-Centric Networking (ICN) is a promising option to bridge and cover these enormous gaps. In this paper, a Smart Collaborative Caching (SCC) scheme is established by leveraging high-level ICN principles for IoT within fog computing paradigm. The proposed solution is supposed to be utilized in resource pooling, content storing, node locating and other related situations. By investigating the available characteristics of ICN, some challenges of such combination are reviewed in depth. The details of building SCC, including basic model and advanced algorithms, are presented based on theoretical analysis and simplified examples. The validation focuses on two typical scenarios: simple status inquiry and complex content sharing. The number of clusters, packet loss probability and other parameters are also considered. The analytical results demonstrate that the performance of our scheme, regarding total packet number and average transmission latency, can outperform that of the original ones. We expect that the SCC will contribute an efficient solution to the related studies.

  9. Shield Effect Of Functional Interlining Fabric

    Directory of Open Access Journals (Sweden)

    Šaravanja Bosiljka

    2015-06-01

    Full Text Available Electromagnetic interference (EMI have become very serious in a variety of different electronic equipments, such as personal computers (frequency at several GHz, mobile devices (0.9 – 2.4 GHz and similar. This imposes the need for setting boundaries for EM emission of electric and electronic devices in order to minimize the possibility of interference with radio and wireless communications. Functional textiles can offer protective properties against EM radiation. The aim of this study is to investigate the degree of protection against EM radiation provided by polyamide copper-coated interlining fabric before and after dry cleaning treatment. EM protection efficiency of the interlining functional fabric is explored on both sides at the frequencies of 0.9; 1.8; 2.1 and 2.4 GHz. The results obtained have shown that the interlining fabric has good protective properties against EM radiation, but after dry cleaning, treatment reduction is observed. Scanning electron microscopy micrographs of the interlining surface confirms shield effect decline due to degradation and firing of the copper layers during the process of dry cleaning.

  10. COMPUTING

    CERN Multimedia

    I. Fisk

    2013-01-01

    Computing activity had ramped down after the completion of the reprocessing of the 2012 data and parked data, but is increasing with new simulation samples for analysis and upgrade studies. Much of the Computing effort is currently involved in activities to improve the computing system in preparation for 2015. Operations Office Since the beginning of 2013, the Computing Operations team successfully re-processed the 2012 data in record time, not only by using opportunistic resources like the San Diego Supercomputer Center which was accessible, to re-process the primary datasets HTMHT and MultiJet in Run2012D much earlier than planned. The Heavy-Ion data-taking period was successfully concluded in February collecting almost 500 T. Figure 3: Number of events per month (data) In LS1, our emphasis is to increase efficiency and flexibility of the infrastructure and operation. Computing Operations is working on separating disk and tape at the Tier-1 sites and the full implementation of the xrootd federation ...

  11. Improved Metal-Polymeric Laminate Radiation Shielding Project

    Data.gov (United States)

    National Aeronautics and Space Administration — In this proposed Phase I program, a multifunctional lightweight radiation shield composite will be developed and fabricated. This structural radiation shielding will...

  12. Foam-Reinforced Polymer Matrix Composite Radiation Shields Project

    Data.gov (United States)

    National Aeronautics and Space Administration — New and innovative lightweight radiation shielding materials are needed to protect humans in future manned exploration vehicles. Radiation shielding materials are...

  13. Computing Mutual Information Based Nonlinear Dependence Among Noisy and Finite Geophysical Time Series

    Science.gov (United States)

    Khan, S.; Bandyopadhyay, S.; Ganguly, A. R.

    2005-12-01

    Linear correlation measures are widely used but may not be adequate for many geophysical problems, especially those that are dominated by nonlinear dynamics and nonlinear interactions. Mutual information (MI), which originated in communications and information theory, can be utilized to obtain measures of complete dependence, or "nonlinear correlation" (NLC). However, while the computation of MI is conceptually straightforward when the full probability density function (PDF) is available, there is no one best approach to compute MI or NLC from finite data sets. The state-of-the-art and emerging approaches used to compute the MI or NLC range from methods that are based on ranking of variables (RANKS), kernel density estimation (KDE), k-nearest neighbors (KNN) and what is called the "Edgeworth approximation" (Edgeworth). However, the emerging literature does not point to a clear winner that outperforms the other methods for real data sets and all the methods can be extremely sensitive to the presence of significant amount of noise. Thus, developing a better estimate often reduces to a better judgmental choice of the model parameters like the number of kernels or neighbors, even though preliminary guidelines may be available. The estimation problem, especially for uncertainty bounds, becomes even more difficult for time series data, where approaches like bootstrapping need to be applied with care. This study implements the four approaches (RANKS, KDE, KNN, Edgeworth) and investigates their relative performance, specifically for limited amount of noisy time series data, as a function of the signal-to-noise ratios and the size of the data. The datasets range from simulations (e.g., time series generated from the Lorenz system of equations contaminated with various noise levels) to real geophysical problems. The relative performance of the methodologies, as well as the insights gained over and above linear correlation approaches, is presented. The impacts of these

  14. Reflector and Shield Material Properties for Project Prometheus

    Energy Technology Data Exchange (ETDEWEB)

    J. Nash

    2005-11-02

    This letter provides updated reflector and shield preliminary material property information to support reactor design efforts. The information provided herein supersedes the applicable portions of Revision 1 to the Space Power Program Preliminary Reactor Design Basis (Reference (a)). This letter partially answers the request in Reference (b) to provide unirradiated and irradiated material properties for beryllium, beryllium oxide, isotopically enriched boron carbide ({sup 11}B{sub 4}C) and lithium hydride. With the exception of {sup 11}B{sub 4}C, the information is provided in Attachments 1 and 2. At the time of issuance of this document, {sup 11}B{sub 4}C had not been studied.

  15. Radiation shield for operator under radiation circumference

    Energy Technology Data Exchange (ETDEWEB)

    Nemezawa, Isao; Kimura, Tadahiro [Hitachi Ltd., Tokyo (Japan); Omori, Tetsu; Mizuochi, Akira

    1997-11-18

    A radiation shield for an upper half of a man`s body comprises a synthetic resin clothing, a rubber plate or a composite member of them formed into a bag. The bag is formed three dimensionally in the form of an open in front vest. A radiation shielding bag for the lower half of a man`s body is formed into three dimensionally in the form of open in front half trousers. A water injection port for injecting water as shielding liquid and a gas exhaust port are formed to each of the bags. Upon operation under radiation circumstance, the water injection ports and the gas exhaustion ports are opened, and shielding liquid is injected from the water injection ports to the bag so that the shielding liquid shields radiation rays. After closing the water injection ports and the gas exhaustion ports, an operator wears and buttons up the radiation shield of the upper half and the lower half to protect radiation exposure from the front, back and the side of a man. (I.N.)

  16. Development of neutron shielding material for cask

    Energy Technology Data Exchange (ETDEWEB)

    Najima, K.; Ohta, H.; Ishihara, N. [Mitsubishi Heavy Industries Ltd., Takasago Research and Development Center, Hyogo (Japan); Matsuoka, T.; Kuri, S.; Ohsono, K.; Hode, S. [Mitsubishi Heavy Industries Ltd., Kobe Shipyard and Machinery Works, Kobe (Japan)

    2001-07-01

    Since 1980's Mitsubishi Heavy Industries, Ltd (MHI) has established transport and storage cask design 'MSF series' which makes higher payload and reliability for long term storage. MSF series transport and storage cask uses new-developed neutron shielding material. This neutron shielding material has been developed for improving durability under high condition for long term. Since epoxy resin contains a lot of hydrogen and is comparatively resistant to heat, many casks employ epoxy base neutron shielding material. However, if the epoxy base neutron shielding material is used under high temperature condition for a long time, the material deteriorates and the moisture contained in it is released. The loss of moisture is in the range of several percents under more than 150 C. For this reason, our purpose was to develop a high durability epoxy base neutron shielding material which has the same self-fire-extinction property, high hydrogen content and so on as conventional. According to the long-time heating test, the weight loss of this new neutron shielding material after 5000 hours heating has been lower than 0.04% at 150 C and 0.35% at 170 C. A thermal test was also performed: a specimen of neutron shielding material covered with stainless steel was inserted in a furnace under condition of 800 C temperature for 30 minutes then was left to cool down in ambient conditions. The external view of the test piece shows that only a thin layer was carbonized.

  17. Extraterrestrial Regolith Derived Atmospheric Entry Heat Shields

    Science.gov (United States)

    Hogue, Michael D.; Mueller, Robert P.; Sibille, Laurent; Hintze, Paul E.; Rasky, Daniel J.

    2016-01-01

    High-mass planetary surface access is one of NASAs technical challenges involving entry, descent and landing (EDL). During the entry and descent phase, frictional interaction with the planetary atmosphere causes a heat build-up to occur on the spacecraft, which will rapidly destroy it if a heat shield is not used. However, the heat shield incurs a mass penalty because it must be launched from Earth with the spacecraft, thus consuming a lot of precious propellant. This NASA Innovative Advanced Concept (NIAC) project investigated an approach to provide heat shield protection to spacecraft after launch and prior to each EDL thus potentially realizing significant launch mass savings. Heat shields fabricated in situ can provide a thermal-protection system for spacecraft that routinely enter a planetary atmosphere. By fabricating the heat shield with space resources from materials available on moons and asteroids, it is possible to avoid launching the heat-shield mass from Earth. Regolith has extremely good insulating properties and the silicates it contains can be used in the fabrication and molding of thermal-protection materials. In this paper, we will describe three types of in situ fabrication methods for heat shields and the testing performed to determine feasibility of this approach.

  18. Spectral Transfer Learning using Information Geometry for a User-Independent Brain-Computer Interface

    Directory of Open Access Journals (Sweden)

    Nicholas Roy Waytowich

    2016-09-01

    Full Text Available Recent advances in signal processing and machine learning techniques have enabled the application of Brain-Computer Interface (BCI technologies to fields such as medicine, industry and recreation. However, BCIs still suffer from the requirement of frequent calibration sessions due to the intra- and inter- individual variability of brain-signals, which makes calibration suppression through transfer learning an area of increasing interest for the development of practical BCI systems. In this paper, we present an unsupervised transfer method (spectral transfer using information geometry, STIG, which ranks and combines unlabeled predictions from an ensemble of information geometry classifiers built on data from individual training subjects. The STIG method is validated in both offline and real-time feedback analysis during a rapid serial visual presentation task (RSVP. For detection of single-trial, event-related potentials (ERPs, the proposed method can significantly outperform existing calibration-free techniques as well as outperform traditional within-subject calibration techniques when limited data is available. This method demonstrates that unsupervised transfer learning for single-trial detection in ERP-based BCIs can be achieved without the requirement of costly training data, representing a step-forward in the overall goal of achieving a practical user-independent BCI system.

  19. Selective tuberculosis incidence estimation by digital computer information technologies in the MS Excel system

    Directory of Open Access Journals (Sweden)

    G. I. Ilnitsky

    2014-01-01

    Full Text Available The incidence of tuberculosis was estimated in different age groups of people, applying the digital computer information technologies of tracking. For this, the author used the annual forms of the reporting materials stipulated by the Ministry of Health of Ukraine, the results of his observations, and the data of bank information accumulation in the MS Excel system. The initial positions were formed in terms of the epidemiological indicators of Ukraine and the Lvov Region during a 10-year period (2000-2009 that was, in relation with different initial characteristics, divided into Step 1 (2000-2004 in which the tuberculosis epidemic situation progressively deteriorated and Step 2 (2005-2009 in which relative morbidity was relatively stabilized. The results were processed using the MS Excel statistical and mathematical functions that were parametric and nonparametric in establishing a correlation when estimating the changes in epidemic parameters. The findings of studies among the general population could lead to the conclusion that the mean tuberculosis morbidity in Ukraine was much greater than that in the Lvov Region irrespective of the age of a population. At the same time, the morbidity rate in the foci of tuberculosis infection suggested that it rose among both the children, adolescents, and adults, which provided a rationale for that therapeutic and preventive measures should be better implemented.

  20. PWR upper/lower internals shield

    Energy Technology Data Exchange (ETDEWEB)

    Homyk, W.A. [Indian Point Station, Buchanan, NY (United States)

    1995-03-01

    During refueling of a nuclear power plant, the reactor upper internals must be removed from the reactor vessel to permit transfer of the fuel. The upper internals are stored in the flooded reactor cavity. Refueling personnel working in containment at a number of nuclear stations typically receive radiation exposure from a portion of the highly contaminated upper intervals package which extends above the normal water level of the refueling pool. This same issue exists with reactor lower internals withdrawn for inservice inspection activities. One solution to this problem is to provide adequate shielding of the unimmersed portion. The use of lead sheets or blankets for shielding of the protruding components would be time consuming and require more effort for installation since the shielding mass would need to be transported to a support structure over the refueling pool. A preferable approach is to use the existing shielding mass of the refueling pool water. A method of shielding was devised which would use a vacuum pump to draw refueling pool water into an inverted canister suspended over the upper internals to provide shielding from the normally exposed components. During the Spring 1993 refueling of Indian Point 2 (IP2), a prototype shield device was demonstrated. This shield consists of a cylindrical tank open at the bottom that is suspended over the refueling pool with I-beams. The lower lip of the tank is two feet below normal pool level. After installation, the air width of the natural shielding provided by the existing pool water. This paper describes the design, development, testing and demonstration of the prototype device.

  1. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion An activity that is still in progress is computing for the heavy-ion program. The heavy-ion events are collected without zero suppression, so the event size is much large at roughly 11 MB per event of RAW. The central collisions are more complex and...

  2. COMPUTING

    CERN Multimedia

    M. Kasemann P. McBride Edited by M-C. Sawley with contributions from: P. Kreuzer D. Bonacorsi S. Belforte F. Wuerthwein L. Bauerdick K. Lassila-Perini M-C. Sawley

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the comput...

  3. CAD-Based Shielding Analysis for ITER Port Diagnostics

    Science.gov (United States)

    Serikov, Arkady; Fischer, Ulrich; Anthoine, David; Bertalot, Luciano; De Bock, Maartin; O'Connor, Richard; Juarez, Rafael; Krasilnikov, Vitaly

    2017-09-01

    Radiation shielding analysis conducted in support of design development of the contemporary diagnostic systems integrated inside the ITER ports is relied on the use of CAD models. This paper presents the CAD-based MCNP Monte Carlo radiation transport and activation analyses for the Diagnostic Upper and Equatorial Port Plugs (UPP #3 and EPP #8, #17). The creation process of the complicated 3D MCNP models of the diagnostics systems was substantially accelerated by application of the CAD-to-MCNP converter programs MCAM and McCad. High performance computing resources of the Helios supercomputer allowed to speed-up the MCNP parallel transport calculations with the MPI/OpenMP interface. The found shielding solutions could be universal, reducing ports R&D costs. The shield block behind the Tritium and Deposit Monitor (TDM) optical box was added to study its influence on Shut-Down Dose Rate (SDDR) in Port Interspace (PI) of EPP#17. Influence of neutron streaming along the Lost Alpha Monitor (LAM) on the neutron energy spectra calculated in the Tangential Neutron Spectrometer (TNS) of EPP#8. For the UPP#3 with Charge eXchange Recombination Spectroscopy (CXRS-core), an excessive neutron streaming along the CXRS shutter, which should be prevented in further design iteration.

  4. Intraplate Seismicity in Fennoscandian Shield

    Science.gov (United States)

    Korja, Annakaisa; Uski, Marja

    2017-04-01

    Fennoscandian Shield is situated in a seismically quiet intraplate setting in northern Europe. Based on a subset of the most recent earthquake data (2000-2012), most of the earthquakes (80%) occur in the upper crust down to 17 km in depth, a minority (19%) in the middle crust (17-31 km) and only a few in the lower crust 31-45 km (1%). The seismogenic layer is less than 30 km in depth and has a rather uniform thickness across Fennoscandian Shield. Reflection profiles suggest only few of the outcropping deformation zones penetrate the upper-middle crustal layer boundary and even fewer reach the lower crust. We suggest that the middle to lower crustal boundary may add compositional and rheological constraints to the depth extent of the seismogenic zone The orientation of the overall maximum horizontal stress field in northern Europe is WNW-ESE to NW-SE. The current strain rates are rather low and thus cannot produce new structures but rather reactivate old structures where stress overcomes fault friction. Pre-existing deformation zones that are optimally oriented in the present stress field can potentially be reactivated. The deformation zones were analysed for their length and azimuth and they were assigned a potential reactivation type (reverse, normal or strike slip) based solely on their azimuth. The earthquakes in the seismically most active area, close to Skellefteå, Sweden along the western coast of the Gulf of Bothnia and its north-easterly continuation, appear to cluster around the shoreline and along post-glacial faults, which are mostly oriented optimally for reverse or strike slip faulting. The seismically active Kuusamo area in Finland is transacted by wealth of deformation zones all trending in directions optimal for reactivation. The fault plane solutions of the most recent moderate size surprise earthquakes (Sveg 15.9.2014 Ml 4.4, Bothnian Bay 19.3.2016 Ml 4.1) suggest strike slip movement in optimally oriented for strike slip faulting according to

  5. Experiences of registered nurses with regard to accessing health information at the point-of-care via mobile computing devices.

    Science.gov (United States)

    Ricks, Esmeralda; Benjamin, Valencia; Williams, Margaret

    2015-11-19

    The volume of health information necessary to provide competent health care today has become overwhelming. Mobile computing devices are fast becoming an essential clinical tool for accessing health information at the point-of-care of patients. This study explored and described how registered nurses experienced accessing information at the point-of-care via mobile computing devices (MCDs). A qualitative, exploratory, descriptive and contextual design was used. Ten in-depth interviews were conducted with purposively sampled registered nurses employed by a state hospital in the Nelson Mandela Bay Municipality (NMBM). Interviews were recorded, transcribed verbatim and analysed using Tesch's data analysis technique. Ethical principles were adhered to throughout the study. Guba's model of trustworthiness was used to confirm integrity of the study. Four themes emerged which revealed that the registered nurses benefited from the training they received by enabling them to develop, and improve, their computer literacy levels. Emphasis was placed on the benefits that the accessed information had for educational purposes for patients and the public, for colleagues and students. Furthermore the ability to access information at the point-of-care was considered by registered nurses as valuable to improve patient care because of the wide range of accurate and readily accessible information available via the mobile computing device. The registered nurses in this study felt that being able to access information at the point-of-care increased their confidence and facilitated the provision of quality care because it assisted them in being accurate and sure of what they were doing.

  6. Information processing in bacteria: memory, computation, and statistical physics: a key issues review

    Science.gov (United States)

    Lan, Ganhui; Tu, Yuhai

    2016-05-01

    preserving information, it does not reveal the underlying mechanism that leads to the observed input-output relationship, nor does it tell us much about which information is important for the organism and how biological systems use information to carry out specific functions. To do that, we need to develop models of the biological machineries, e.g. biochemical networks and neural networks, to understand the dynamics of biological information processes. This is a much more difficult task. It requires deep knowledge of the underlying biological network—the main players (nodes) and their interactions (links)—in sufficient detail to build a model with predictive power, as well as quantitative input-output measurements of the system under different perturbations (both genetic variations and different external conditions) to test the model predictions to guide further development of the model. Due to the recent growth of biological knowledge thanks in part to high throughput methods (sequencing, gene expression microarray, etc) and development of quantitative in vivo techniques such as various florescence technology, these requirements are starting to be realized in different biological systems. The possible close interaction between quantitative experimentation and theoretical modeling has made systems biology an attractive field for physicists interested in quantitative biology. In this review, we describe some of the recent work in developing a quantitative predictive model of bacterial chemotaxis, which can be considered as the hydrogen atom of systems biology. Using statistical physics approaches, such as the Ising model and Langevin equation, we study how bacteria, such as E. coli, sense and amplify external signals, how they keep a working memory of the stimuli, and how they use these data to compute the chemical gradient. In particular, we will describe how E. coli cells avoid cross-talk in a heterogeneous receptor cluster to keep a ligand-specific memory. We will also

  7. A Perception Study of Computer Science and Information Systems Students on Bullying Prevalence in the Information Systems Profession

    Science.gov (United States)

    Lawler, James; Molluzzo, John C.

    2016-01-01

    Bullying is considered to be omnipresent in business firms and prevalent in entrepreneurial firms in information systems and in departments of information systems in industry. Entrepreneurialism and narcissism of personalities in the information systems profession may be perceived as especially predisposed to bullying. The authors of this paper…

  8. Inform@ed space

    DEFF Research Database (Denmark)

    Bjerrum, Peter; Olsen, Kasper Nefer

    2001-01-01

    Inform@ed space Sensorial Perception And Computer Enchancement - bidrag til Nordisk Arkitekturforskningsforenings IT-konference, AAA april 2001.......Inform@ed space Sensorial Perception And Computer Enchancement - bidrag til Nordisk Arkitekturforskningsforenings IT-konference, AAA april 2001....

  9. COMPUTING

    CERN Multimedia

    P. McBride

    It has been a very active year for the computing project with strong contributions from members of the global community. The project has focused on site preparation and Monte Carlo production. The operations group has begun processing data from P5 as part of the global data commissioning. Improvements in transfer rates and site availability have been seen as computing sites across the globe prepare for large scale production and analysis as part of CSA07. Preparations for the upcoming Computing Software and Analysis Challenge CSA07 are progressing. Ian Fisk and Neil Geddes have been appointed as coordinators for the challenge. CSA07 will include production tests of the Tier-0 production system, reprocessing at the Tier-1 sites and Monte Carlo production at the Tier-2 sites. At the same time there will be a large analysis exercise at the Tier-2 centres. Pre-production simulation of the Monte Carlo events for the challenge is beginning. Scale tests of the Tier-0 will begin in mid-July and the challenge it...

  10. COMPUTING

    CERN Multimedia

    I. Fisk

    2012-01-01

    Introduction Computing continued with a high level of activity over the winter in preparation for conferences and the start of the 2012 run. 2012 brings new challenges with a new energy, more complex events, and the need to make the best use of the available time before the Long Shutdown. We expect to be resource constrained on all tiers of the computing system in 2012 and are working to ensure the high-priority goals of CMS are not impacted. Heavy ions After a successful 2011 heavy-ion run, the programme is moving to analysis. During the run, the CAF resources were well used for prompt analysis. Since then in 2012 on average 200 job slots have been used continuously at Vanderbilt for analysis workflows. Operations Office As of 2012, the Computing Project emphasis has moved from commissioning to operation of the various systems. This is reflected in the new organisation structure where the Facilities and Data Operations tasks have been merged into a common Operations Office, which now covers everything ...

  11. COMPUTING

    CERN Multimedia

    I. Fisk

    2011-01-01

    Introduction It has been a very active quarter in Computing with interesting progress in all areas. The activity level at the computing facilities, driven by both organised processing from data operations and user analysis, has been steadily increasing. The large-scale production of simulated events that has been progressing throughout the fall is wrapping-up and reprocessing with pile-up will continue. A large reprocessing of all the proton-proton data has just been released and another will follow shortly. The number of analysis jobs by users each day, that was already hitting the computing model expectations at the time of ICHEP, is now 33% higher. We are expecting a busy holiday break to ensure samples are ready in time for the winter conferences. Heavy Ion The Tier 0 infrastructure was able to repack and promptly reconstruct heavy-ion collision data. Two copies were made of the data at CERN using a large CASTOR disk pool, and the core physics sample was replicated ...

  12. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction More than seventy CMS collaborators attended the Computing and Offline Workshop in San Diego, California, April 20-24th to discuss the state of readiness of software and computing for collisions. Focus and priority were given to preparations for data taking and providing room for ample dialog between groups involved in Commissioning, Data Operations, Analysis and MC Production. Throughout the workshop, aspects of software, operating procedures and issues addressing all parts of the computing model were discussed. Plans for the CMS participation in STEP’09, the combined scale testing for all four experiments due in June 2009, were refined. The article in CMS Times by Frank Wuerthwein gave a good recap of the highly collaborative atmosphere of the workshop. Many thanks to UCSD and to the organizers for taking care of this workshop, which resulted in a long list of action items and was definitely a success. A considerable amount of effort and care is invested in the estimate of the co...

  13. COMPUTING

    CERN Multimedia

    M. Kasemann

    CCRC’08 challenges and CSA08 During the February campaign of the Common Computing readiness challenges (CCRC’08), the CMS computing team had achieved very good results. The link between the detector site and the Tier0 was tested by gradually increasing the number of parallel transfer streams well beyond the target. Tests covered the global robustness at the Tier0, processing a massive number of very large files and with a high writing speed to tapes.  Other tests covered the links between the different Tiers of the distributed infrastructure and the pre-staging and reprocessing capacity of the Tier1’s: response time, data transfer rate and success rate for Tape to Buffer staging of files kept exclusively on Tape were measured. In all cases, coordination with the sites was efficient and no serious problem was found. These successful preparations prepared the ground for the second phase of the CCRC’08 campaign, in May. The Computing Software and Analysis challen...

  14. COMPUTING

    CERN Multimedia

    I. Fisk

    2010-01-01

    Introduction The first data taking period of November produced a first scientific paper, and this is a very satisfactory step for Computing. It also gave the invaluable opportunity to learn and debrief from this first, intense period, and make the necessary adaptations. The alarm procedures between different groups (DAQ, Physics, T0 processing, Alignment/calibration, T1 and T2 communications) have been reinforced. A major effort has also been invested into remodeling and optimizing operator tasks in all activities in Computing, in parallel with the recruitment of new Cat A operators. The teams are being completed and by mid year the new tasks will have been assigned. CRB (Computing Resource Board) The Board met twice since last CMS week. In December it reviewed the experience of the November data-taking period and could measure the positive improvements made for the site readiness. It also reviewed the policy under which Tier-2 are associated with Physics Groups. Such associations are decided twice per ye...

  15. COMPUTING

    CERN Multimedia

    M. Kasemann

    Introduction During the past six months, Computing participated in the STEP09 exercise, had a major involvement in the October exercise and has been working with CMS sites on improving open issues relevant for data taking. At the same time operations for MC production, real data reconstruction and re-reconstructions and data transfers at large scales were performed. STEP09 was successfully conducted in June as a joint exercise with ATLAS and the other experiments. It gave good indication about the readiness of the WLCG infrastructure with the two major LHC experiments stressing the reading, writing and processing of physics data. The October Exercise, in contrast, was conducted as an all-CMS exercise, where Physics, Computing and Offline worked on a common plan to exercise all steps to efficiently access and analyze data. As one of the major results, the CMS Tier-2s demonstrated to be fully capable for performing data analysis. In recent weeks, efforts were devoted to CMS Computing readiness. All th...

  16. Comparative study of radiation shielding parameters for bismuth borate glasses

    Energy Technology Data Exchange (ETDEWEB)

    Kaundal, Rajinder Singh, E-mail: rajinder_apd@yahoo.com [Department of Physics, School of Physical Sciences, Lovely Professional University, Phagwara, Punjab (India)

    2016-07-15

    Melt and quench technique was used for the preparation of glassy samples of the composition x Bi{sub 2}O{sub 3-}(1-x) B{sub 2}O{sub 3} where x= .05 to .040. XCOM computer program is used for the evaluation of gamma-ray shielding parameters of the prepared glass samples. Further the values of mass attenuation coefficients, effective atomic number and half value layer for the glassy samples have been calculated in the energy range from 1KeV to 100GeV. Rigidity of the glass samples have been analyzed by molar volume of the prepared glass samples. (author)

  17. The Development of a Computer Based Education Management Information System (MIS Model in Elementary School Bandar Lampung

    Directory of Open Access Journals (Sweden)

    Riswandi Riswandi

    2017-02-01

    Full Text Available The general objective of the research is to develop a model of  a computer-based education management information systems (MIS in Elementary schools   and the specific objectives were to (1 develop a prototype model of an education MIS computer-based; and (2 to develop the procedure Manual of a computer-based education MIS models. The design of the research was research and development proposed by Borg and Gall. The samples were elementary schools in the city of Bandar Lampung. The research procedure were (1 determining the location of the research, (2 collecting data, (3 designing the initial product and validating to the experts, (4 conducting a seminar in the forum group discussion (FGD, and (5 revising the first design. The result of the product is a prototype model of computer-based education MIS and the manual procedure of computer based education MIS for the elementary school.

  18. Long Duration Space Shelter Shielding Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Physical Sciences Inc. (PSI) has developed a ceramic composite material system that is more effective for shielding both GCR and SPE than aluminum. The composite...

  19. Thermal Shield and Reactor Structure Temperatures

    Energy Technology Data Exchange (ETDEWEB)

    Collier, A.R.

    2001-07-31

    The purpose of this report is to present reactor structure and thermal shield temperature data taken during P-3 and P-5 cycles and compare them with design calculations in order to predict temperatures at higher power levels.

  20. Shielded ADR Magnets For Space Applications Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Phase II program will concentrate on manufacturing of qualified low-current, light-weight, 10K ADR magnets for space application. Shielded ADR solenoidal magnets...